Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-0108 (GCVE-0-2022-0108)
Vulnerability from cvelistv5
Published
2022-02-11 00:00
Modified
2024-08-02 23:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Inappropriate implementation
Summary
Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html" }, { "tags": [ "x_transferred" ], "url": "https://crbug.com/1248444" }, { "name": "FEDORA-2022-d1a15f9cdb", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/" }, { "name": "FEDORA-2022-49b52819a4", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQJB6ZPRLKV6WCMX2PRRRQBFAOXFBK6B/" }, { "name": "FEDORA-2022-57923346cf", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRWRAXAFR3JR7XCFWTHC2KALSZKWACCE/" }, { "name": "[oss-security] 20230421 WebKitGTK and WPE WebKit Security Advisory WSA-2023-0003", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/04/21/3" }, { "name": "FEDORA-2023-5b61346bbe", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK/" }, { "name": "FEDORA-2023-a4bbf02a57", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/" }, { "name": "DSA-5397", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5397" }, { "name": "DSA-5396", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5396" }, { "name": "FEDORA-2023-8900b35c6f", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A/" }, { "name": "[debian-lts-announce] 20230512 [SECURITY] [DLA 3419-1] webkit2gtk security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00011.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "97.0.4692.71", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Inappropriate implementation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-12T00:00:00", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "url": "https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html" }, { "url": "https://crbug.com/1248444" }, { "name": "FEDORA-2022-d1a15f9cdb", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/" }, { "name": "FEDORA-2022-49b52819a4", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQJB6ZPRLKV6WCMX2PRRRQBFAOXFBK6B/" }, { "name": "FEDORA-2022-57923346cf", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRWRAXAFR3JR7XCFWTHC2KALSZKWACCE/" }, { "name": "[oss-security] 20230421 WebKitGTK and WPE WebKit Security Advisory WSA-2023-0003", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2023/04/21/3" }, { "name": "FEDORA-2023-5b61346bbe", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK/" }, { "name": "FEDORA-2023-a4bbf02a57", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/" }, { "name": "DSA-5397", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5397" }, { "name": "DSA-5396", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5396" }, { "name": "FEDORA-2023-8900b35c6f", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A/" }, { "name": "[debian-lts-announce] 20230512 [SECURITY] [DLA 3419-1] webkit2gtk security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00011.html" } ] } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2022-0108", "datePublished": "2022-02-11T00:00:00", "dateReserved": "2022-01-04T00:00:00", "dateUpdated": "2024-08-02T23:18:41.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-0108\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2022-02-12T00:15:07.660\",\"lastModified\":\"2024-11-21T06:37:55.373\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\"},{\"lang\":\"es\",\"value\":\"Una implementaci\u00f3n inapropiada de Navigation en Google Chrome versiones anteriores a 97.0.4692.71, permit\u00eda a un atacante remoto filtrar datos de origen cruzado por medio de una p\u00e1gina HTML dise\u00f1ada\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-346\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"97.0.4692.71\",\"matchCriteriaId\":\"E2765FA7-0DF8-4281-972A-64402DAC9853\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2023/04/21/3\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://crbug.com/1248444\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/05/msg00011.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK/\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A/\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQJB6ZPRLKV6WCMX2PRRRQBFAOXFBK6B/\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRWRAXAFR3JR7XCFWTHC2KALSZKWACCE/\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://www.debian.org/security/2023/dsa-5396\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://www.debian.org/security/2023/dsa-5397\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/04/21/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://crbug.com/1248444\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/05/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQJB6ZPRLKV6WCMX2PRRRQBFAOXFBK6B/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRWRAXAFR3JR7XCFWTHC2KALSZKWACCE/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2023/dsa-5396\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2023/dsa-5397\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2025:10364
Vulnerability from csaf_redhat
Published
2025-07-07 02:28
Modified
2025-07-16 14:44
Summary
Red Hat Security Advisory: webkitgtk4 security update
Notes
Topic
An update for webkitgtk4 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
WebKitGTK+ is port of the WebKit portable web rendering engine to the GTK+ platform. These packages provide WebKitGTK+ for GTK+ 3.
Security Fix(es):
* webkitgtk: Command injection in web inspector (CVE-2020-9862)
* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9893)
* webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution (CVE-2020-9894)
* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9895)
* webkitgtk: Access issue in content security policy (CVE-2020-9915)
* webkitgtk: A logic issue may lead to cross site scripting (CVE-2020-9925)
* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9802)
* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9803)
* webkitgtk: Logic issue may lead to cross site scripting (CVE-2020-9805)
* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9806)
* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9807)
* webkitgtk: Input validation issue may lead to cross site scripting (CVE-2020-9843)
* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9850)
* webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl (CVE-2020-13753)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)
* webkitgtk: input validation issue may lead to a cross site scripting (CVE-2020-9952)
* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)
* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)
* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)
* webkitgtk: use after free issue may lead to arbitrary code execution (CVE-2020-9947)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)
* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)
* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)
* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-1817)
* webkitgtk: Memory initialization issue possibly leading to memory disclosure (CVE-2021-1820)
* webkitgtk: Input validation issue leading to cross site scripting attack (CVE-2021-1825)
* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-1826)
* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)
* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30661)
* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30666)
* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)
* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)
* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)
* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)
* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30761)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30762)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)
* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)
* webkitgtk: limited sandbox escape via VFS syscalls (CVE-2021-42762)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)
* webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)
* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)
* webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)
* webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)
* webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)
* webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)
* webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)
* webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)
* chromium-browser: Inappropriate implementation in Navigation (CVE-2022-0108)
* webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)
* webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)
* webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)
* webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)
* webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)
* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)
* webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)
* webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)
* webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer (CVE-2022-30294)
* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)
* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)
* webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted (CVE-2022-22677)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)
* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)
* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)
* webkitgtk: out-of-bounds read was addressed with improved bounds checking (CVE-2022-32912)
* webkitgtk: UI spoofing while Visiting a website that frames malicious content (CVE-2022-32891)
* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)
* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)
* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)
* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)
* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)
* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)
* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)
* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)
* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)
* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)
* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)
* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)
* WebKitGTK: use-after-free leads to arbitrary code execution (CVE-2023-28205)
* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)
* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)
* webkitgtk: improper bounds checking leading to arbitrary code execution (CVE-2022-48503)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435)
* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439)
* webkitgtk: arbitrary code execution (CVE-2023-37450)
* webkitgtk: arbitrary code execution (CVE-2023-32393)
* webkitgtk: disclose sensitive information (CVE-2023-38133)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-38592)
* webkitgtk: arbitrary code execution (CVE-2023-38594)
* webkitgtk: arbitrary code execution (CVE-2023-38595)
* webkitgtk: track sensitive user information (CVE-2023-38599)
* webkitgtk: arbitrary code execution (CVE-2023-38600)
* webkitgtk: arbitrary code execution (CVE-2023-38611)
* webkitgtk: bypass Same Origin Policy (CVE-2023-38572)
* webkitgtk: arbitrary code execution (CVE-2023-38597)
* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)
* webkitgtk: Same Origin Policy bypass via crafted web content (CVE-2023-27932)
* webkitgtk: Website may be able to track sensitive user information (CVE-2023-27954)
* webkitgtk: use after free vulnerability (CVE-2023-28198)
* webkitgtk: content security policy blacklist failure (CVE-2023-32370)
* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32792)
* webkitgtk: malicious content may lead to UI spoofing (CVE-2022-32816)
* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-41993)
* webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (CVE-2023-39928)
* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-35074)
* webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code (CVE-2023-40451)
* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-41074)
* webkitgtk: Out-of-bounds read leads to sensitive data leak (CVE-2023-42916)
* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)
* webkitgtk: processing a malicious image may lead to a denial of service (CVE-2023-42883)
* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-42890)
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-23213)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-40414)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42833)
* webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents (CVE-2014-1745)
* webkit: processing malicious web content may lead to denial-of-service (CVE-2024-23252)
* webkit: malicious website may exfiltrate audio data cross-origin (CVE-2024-23254)
* webkit: processing malicious web content prevents Content Security Policy from being enforced (CVE-2024-23263)
* webkit: maliciously crafted webpage may be able to fingerprint the user (CVE-2024-23280)
* webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced (CVE-2024-23284)
* webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing. (CVE-2022-32919)
* webkitgtk: A website may able to track visited websites in private browsing (CVE-2022-32933)
* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2022-46705)
* webkitgtk: Visiting a malicious website may lead to address bar spoofing. (CVE-2022-46725)
* webkitgtk: User password may be read aloud by a text-to-speech accessibility feature (CVE-2023-32359)
* webkitgtk: Processing web content may lead to a denial of service (CVE-2023-41983)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)
* webkit: visiting a malicious website may lead to address bar spoofing (CVE-2023-42843)
* webkit: heap use-after-free may lead to arbitrary code execution (CVE-2023-42950)
* webkit: processing malicious web content may lead to a denial of service (CVE-2023-42956)
* chromium-browser: Use after free in ANGLE (CVE-2024-4558)
* webkit: pointer authentication bypass (CVE-2024-27834)
* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)
* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)
* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)
* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)
* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)
* webkitgtk: data isolation bypass vulnerability (CVE-2024-44309)
* webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-44308)
* WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54479)
* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54502)
* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54505)
* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54508)
* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54534)
* webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution (CVE-2024-27856)
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54543)
* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2025-24143)
* webkitgtk: Copying a URL from Web Inspector may lead to command injection (CVE-2025-24150)
* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2025-24158)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24162)
* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54658)
* webkitgtk: out-of-bounds write vulnerability (CVE-2025-24201)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467)
* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551)
* webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209)
* webkitgtk: A type confusion issue could lead to memory corruption (CVE-2025-24213)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24264)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42875)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42970)
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-24223)
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-31204)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2025-31205)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31206)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-31215)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31257)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkitgtk4 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK+ is port of the WebKit portable web rendering engine to the GTK+ platform. These packages provide WebKitGTK+ for GTK+ 3.\n\nSecurity Fix(es):\n\n* webkitgtk: Command injection in web inspector (CVE-2020-9862)\n\n* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9893)\n\n* webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution (CVE-2020-9894)\n\n* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9895)\n\n* webkitgtk: Access issue in content security policy (CVE-2020-9915)\n\n* webkitgtk: A logic issue may lead to cross site scripting (CVE-2020-9925)\n\n* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9802)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9803)\n\n* webkitgtk: Logic issue may lead to cross site scripting (CVE-2020-9805)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9806)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9807)\n\n* webkitgtk: Input validation issue may lead to cross site scripting (CVE-2020-9843)\n\n* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9850)\n\n* webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl (CVE-2020-13753)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)\n\n* webkitgtk: input validation issue may lead to a cross site scripting (CVE-2020-9952)\n\n* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)\n\n* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)\n\n* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)\n\n* webkitgtk: use after free issue may lead to arbitrary code execution (CVE-2020-9947)\n\n* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)\n\n* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)\n\n* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)\n\n* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)\n\n* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)\n\n* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-1817)\n\n* webkitgtk: Memory initialization issue possibly leading to memory disclosure (CVE-2021-1820)\n\n* webkitgtk: Input validation issue leading to cross site scripting attack (CVE-2021-1825)\n\n* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-1826)\n\n* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)\n\n* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30661)\n\n* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30666)\n\n* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)\n\n* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)\n\n* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)\n\n* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)\n\n* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30761)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30762)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)\n\n* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)\n\n* webkitgtk: limited sandbox escape via VFS syscalls (CVE-2021-42762)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)\n\n* webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)\n\n* webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)\n\n* webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)\n\n* webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)\n\n* webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)\n\n* webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)\n\n* webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)\n\n* chromium-browser: Inappropriate implementation in Navigation (CVE-2022-0108)\n\n* webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)\n\n* webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)\n\n* webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)\n\n* webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)\n\n* webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)\n\n* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)\n\n* webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)\n\n* webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)\n\n* webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer (CVE-2022-30294)\n\n* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)\n\n* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)\n\n* webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted (CVE-2022-22677)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)\n\n* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)\n\n* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)\n\n* webkitgtk: out-of-bounds read was addressed with improved bounds checking (CVE-2022-32912)\n\n* webkitgtk: UI spoofing while Visiting a website that frames malicious content (CVE-2022-32891)\n\n* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)\n\n* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)\n\n* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)\n\n* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)\n\n* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)\n\n* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)\n\n* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)\n\n* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)\n\n* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)\n\n* WebKitGTK: use-after-free leads to arbitrary code execution (CVE-2023-28205)\n\n* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)\n\n* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)\n\n* webkitgtk: improper bounds checking leading to arbitrary code execution (CVE-2022-48503)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439)\n\n* webkitgtk: arbitrary code execution (CVE-2023-37450)\n\n* webkitgtk: arbitrary code execution (CVE-2023-32393)\n\n* webkitgtk: disclose sensitive information (CVE-2023-38133)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-38592)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38594)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38595)\n\n* webkitgtk: track sensitive user information (CVE-2023-38599)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38600)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38611)\n\n* webkitgtk: bypass Same Origin Policy (CVE-2023-38572)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38597)\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: Same Origin Policy bypass via crafted web content (CVE-2023-27932)\n\n* webkitgtk: Website may be able to track sensitive user information (CVE-2023-27954)\n\n* webkitgtk: use after free vulnerability (CVE-2023-28198)\n\n* webkitgtk: content security policy blacklist failure (CVE-2023-32370)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32792)\n\n* webkitgtk: malicious content may lead to UI spoofing (CVE-2022-32816)\n\n* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-41993)\n\n* webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (CVE-2023-39928)\n\n* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-35074)\n\n* webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code (CVE-2023-40451)\n\n* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-41074)\n\n* webkitgtk: Out-of-bounds read leads to sensitive data leak (CVE-2023-42916)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: processing a malicious image may lead to a denial of service (CVE-2023-42883)\n\n* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-42890)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-23213)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-40414)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42833)\n\n* webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents (CVE-2014-1745)\n\n* webkit: processing malicious web content may lead to denial-of-service (CVE-2024-23252)\n\n* webkit: malicious website may exfiltrate audio data cross-origin (CVE-2024-23254)\n\n* webkit: processing malicious web content prevents Content Security Policy from being enforced (CVE-2024-23263)\n\n* webkit: maliciously crafted webpage may be able to fingerprint the user (CVE-2024-23280)\n\n* webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced (CVE-2024-23284)\n\n* webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing. (CVE-2022-32919)\n\n* webkitgtk: A website may able to track visited websites in private browsing (CVE-2022-32933)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2022-46705)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing. (CVE-2022-46725)\n\n* webkitgtk: User password may be read aloud by a text-to-speech accessibility feature (CVE-2023-32359)\n\n* webkitgtk: Processing web content may lead to a denial of service (CVE-2023-41983)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* webkit: visiting a malicious website may lead to address bar spoofing (CVE-2023-42843)\n\n* webkit: heap use-after-free may lead to arbitrary code execution (CVE-2023-42950)\n\n* webkit: processing malicious web content may lead to a denial of service (CVE-2023-42956)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkit: pointer authentication bypass (CVE-2024-27834)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)\n\n* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)\n\n* webkitgtk: data isolation bypass vulnerability (CVE-2024-44309)\n\n* webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-44308)\n\n* WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54479)\n\n* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54502)\n\n* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54505)\n\n* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54508)\n\n* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54534)\n\n* webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution (CVE-2024-27856)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54543)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2025-24143)\n\n* webkitgtk: Copying a URL from Web Inspector may lead to command injection (CVE-2025-24150)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2025-24158)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24162)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54658)\n\n* webkitgtk: out-of-bounds write vulnerability (CVE-2025-24201)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551)\n\n* webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209)\n\n* webkitgtk: A type confusion issue could lead to memory corruption (CVE-2025-24213)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24264)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42875)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42970)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-24223)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-31204)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2025-31205)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31206)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-31215)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31257)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:10364", "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1879532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879532" }, { "category": "external", "summary": "1879535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879535" }, { "category": "external", "summary": "1879536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879536" }, { "category": "external", "summary": "1879538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879538" }, { "category": "external", "summary": "1879540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879540" }, { "category": "external", "summary": "1879541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879541" }, { "category": "external", "summary": "1879545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879545" }, { "category": "external", "summary": "1879557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879557" }, { "category": "external", "summary": "1879559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879559" }, { "category": "external", "summary": "1879563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879563" }, { "category": "external", "summary": "1879564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879564" }, { "category": "external", "summary": "1879566", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879566" }, { "category": "external", "summary": "1879568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879568" }, { "category": "external", "summary": "1879570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879570" }, { "category": "external", "summary": "1901212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901212" }, { "category": "external", "summary": "1901214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901214" }, { "category": "external", "summary": "1901216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901216" }, { "category": "external", "summary": "1901219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901219" }, { "category": "external", "summary": "1901221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901221" }, { "category": "external", "summary": "1903568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903568" }, { "category": "external", "summary": "1928886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928886" }, { "category": "external", "summary": "1944323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944323" }, { "category": "external", "summary": "1944329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944329" }, { "category": "external", "summary": "1944331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944331" }, { "category": "external", "summary": "1944333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944333" }, { "category": "external", "summary": "1944337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944337" }, { "category": "external", "summary": "1944340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944340" }, { "category": "external", "summary": "1944343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944343" }, { "category": "external", "summary": "1944350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944350" }, { "category": "external", "summary": "1944859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944859" }, { "category": "external", "summary": "1944862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944862" }, { "category": "external", "summary": "1944867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944867" }, { "category": "external", "summary": "1980441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980441" }, { "category": "external", "summary": "1986852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986852" }, { "category": "external", "summary": "1986856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986856" }, { "category": "external", "summary": "1986858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986858" }, { "category": "external", "summary": "1986860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986860" }, { "category": "external", "summary": "1986863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986863" }, { "category": "external", "summary": "1986866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986866" }, { "category": "external", "summary": "1986870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986870" }, { "category": "external", "summary": "1986872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986872" }, { "category": "external", "summary": "1986874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986874" }, { "category": "external", "summary": "1986877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986877" }, { "category": "external", "summary": "1986879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986879" }, { "category": "external", "summary": "1986881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986881" }, { "category": "external", "summary": "1986883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986883" }, { "category": "external", "summary": "1986886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986886" }, { "category": "external", "summary": "1986888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986888" }, { "category": "external", "summary": "1986890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986890" }, { "category": "external", "summary": "1986892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986892" }, { "category": "external", "summary": "1986894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986894" }, { "category": "external", "summary": "1986898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986898" }, { "category": "external", "summary": "1986900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986900" }, { "category": "external", "summary": "1986902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986902" }, { "category": "external", "summary": "1986906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986906" }, { "category": "external", "summary": "2016673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016673" }, { "category": "external", "summary": "2017898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898" }, { "category": "external", "summary": "2017901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901" }, { "category": "external", "summary": "2017904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904" }, { "category": "external", "summary": "2018573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573" }, { "category": "external", "summary": "2034347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347" }, { "category": "external", "summary": "2034368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368" }, { "category": "external", "summary": "2034373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373" }, { "category": "external", "summary": "2034376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376" }, { "category": "external", "summary": "2034378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378" }, { "category": "external", "summary": "2034381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381" }, { "category": "external", "summary": "2034383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383" }, { "category": "external", "summary": "2034386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386" }, { "category": "external", "summary": "2034389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389" }, { "category": "external", "summary": "2037469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037469" }, { "category": "external", "summary": "2038907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907" }, { "category": "external", "summary": "2040327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327" }, { "category": "external", "summary": "2040329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329" }, { "category": "external", "summary": "2040331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331" }, { "category": "external", "summary": "2044521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521" }, { "category": "external", "summary": "2044528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528" }, { "category": "external", "summary": "2044534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534" }, { "category": "external", "summary": "2044538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538" }, { "category": "external", "summary": "2044542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542" }, { "category": "external", "summary": "2044551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551" }, { "category": "external", "summary": "2044553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553" }, { "category": "external", "summary": "2045291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291" }, { "category": "external", "summary": "2053179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179" }, { "category": "external", "summary": "2053181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181" }, { "category": "external", "summary": "2053185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185" }, { "category": "external", "summary": "2056474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474" }, { "category": "external", "summary": "2073893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893" }, { "category": "external", "summary": "2073896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896" }, { "category": "external", "summary": "2073899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899" }, { "category": "external", "summary": "2073903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903" }, { "category": "external", "summary": "2082544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082544" }, { "category": "external", "summary": "2082548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548" }, { "category": "external", "summary": "2092732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732" }, { "category": "external", "summary": "2092733", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733" }, { "category": "external", "summary": "2092734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734" }, { "category": "external", "summary": "2092735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735" }, { "category": "external", "summary": "2092736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736" }, { "category": "external", "summary": "2104787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787" }, { "category": "external", "summary": "2104788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104788" }, { "category": "external", "summary": "2104789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789" }, { "category": "external", "summary": "2121645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121645" }, { "category": "external", "summary": "2128643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643" }, { "category": "external", "summary": "2128645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128645" }, { "category": "external", "summary": "2128647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647" }, { "category": "external", "summary": "2140501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501" }, { "category": "external", "summary": "2140502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502" }, { "category": "external", "summary": "2140503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503" }, { "category": "external", "summary": "2140504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504" }, { "category": "external", "summary": "2140505", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505" }, { "category": "external", "summary": "2153683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153683" }, { "category": "external", "summary": "2156986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986" }, { "category": "external", "summary": "2156987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987" }, { "category": "external", "summary": "2156989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989" }, { "category": "external", "summary": "2156990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990" }, { "category": "external", "summary": "2156991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991" }, { "category": "external", "summary": "2156992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992" }, { "category": "external", "summary": "2156993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993" }, { "category": "external", "summary": "2156994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994" }, { "category": "external", "summary": "2167715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715" }, { "category": "external", "summary": "2167716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716" }, { "category": "external", "summary": "2167717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717" }, { "category": "external", "summary": "2169934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169934" }, { "category": "external", "summary": "2175099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099" }, { "category": "external", "summary": "2185724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185724" }, { "category": "external", "summary": "2209208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208" }, { "category": "external", "summary": "2209214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214" }, { "category": "external", "summary": "2218623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623" }, { "category": "external", "summary": "2218626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626" }, { "category": "external", "summary": "2218640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640" }, { "category": "external", "summary": "2223000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223000" }, { "category": "external", "summary": "2224608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224608" }, { "category": "external", "summary": "2231015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231015" }, { "category": "external", "summary": "2231017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231017" }, { "category": "external", "summary": "2231018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231018" }, { "category": "external", "summary": "2231019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231019" }, { "category": "external", "summary": "2231020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231020" }, { "category": "external", "summary": "2231021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231021" }, { "category": "external", "summary": "2231022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231022" }, { "category": "external", "summary": "2231028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231028" }, { "category": "external", "summary": "2231043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231043" }, { "category": "external", "summary": "2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "2236843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236843" }, { "category": "external", "summary": "2236844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236844" }, { "category": "external", "summary": "2238943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238943" }, { "category": "external", "summary": "2238944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238944" }, { "category": "external", "summary": "2238945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945" }, { "category": "external", "summary": "2238973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973" }, { "category": "external", "summary": "2238975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975" }, { "category": "external", "summary": "2240522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240522" }, { "category": "external", "summary": "2241400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241400" }, { "category": "external", "summary": "2241403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241403" }, { "category": "external", "summary": "2241409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241409" }, { "category": "external", "summary": "2241412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241412" }, { "category": "external", "summary": "2253054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253054" }, { "category": "external", "summary": "2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "2254326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254326" }, { "category": "external", "summary": "2254327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254327" }, { "category": "external", "summary": "2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "2270141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270141" }, { "category": "external", "summary": "2270143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270143" }, { "category": "external", "summary": "2270146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270146" }, { "category": "external", "summary": "2270151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270151" }, { "category": "external", "summary": "2270288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270288" }, { "category": "external", "summary": "2270289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270289" }, { "category": "external", "summary": "2270290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270290" }, { "category": "external", "summary": "2270291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270291" }, { "category": "external", "summary": "2270292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270292" }, { "category": "external", "summary": "2271437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271437" }, { "category": "external", "summary": "2271441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271441" }, { "category": "external", "summary": "2271444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271444" }, { "category": "external", "summary": "2271446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271446" }, { "category": "external", "summary": "2271449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271449" }, { "category": "external", "summary": "2271453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271453" }, { "category": "external", "summary": "2271456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456" }, { "category": "external", "summary": "2271717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271717" }, { "category": "external", "summary": "2271718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271718" }, { "category": "external", "summary": "2271719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271719" }, { "category": "external", "summary": "2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "2282412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412" }, { "category": "external", "summary": "2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "2312724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724" }, { "category": "external", "summary": "2314696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696" }, { "category": "external", "summary": "2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "2314702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702" }, { "category": "external", "summary": "2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "2314706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706" }, { "category": "external", "summary": "2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "external", "summary": "2323289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289" }, { "category": "external", "summary": "2327927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327927" }, { "category": "external", "summary": "2327931", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327931" }, { "category": "external", "summary": "2333841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841" }, { "category": "external", "summary": "2333843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843" }, { "category": "external", "summary": "2333844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844" }, { "category": "external", "summary": "2333845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845" }, { "category": "external", "summary": "2333846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846" }, { "category": "external", "summary": "2344618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618" }, { "category": "external", "summary": "2344619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619" }, { "category": "external", "summary": "2344621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621" }, { "category": "external", "summary": "2344622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622" }, { "category": "external", "summary": "2344623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623" }, { "category": "external", "summary": "2344624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624" }, { "category": "external", "summary": "2344946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344946" }, { "category": "external", "summary": "2351802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351802" }, { "category": "external", "summary": "2353871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353871" }, { "category": "external", "summary": "2353872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353872" }, { "category": "external", "summary": "2357909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357909" }, { "category": "external", "summary": "2357910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357910" }, { "category": "external", "summary": "2357911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357911" }, { "category": "external", "summary": "2357913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357913" }, { "category": "external", "summary": "2357917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357917" }, { "category": "external", "summary": "2357918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918" }, { "category": "external", "summary": "2357919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357919" }, { "category": "external", "summary": "2366497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497" }, { "category": "external", "summary": "2366498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498" }, { "category": "external", "summary": "2366499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499" }, { "category": "external", "summary": "2366500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500" }, { "category": "external", "summary": "2366501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366501" }, { "category": "external", "summary": "2366502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502" }, { "category": "external", "summary": "2366503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503" }, { "category": "external", "summary": "2366504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366504" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10364.json" } ], "title": "Red Hat Security Advisory: webkitgtk4 security update", "tracking": { "current_release_date": "2025-07-16T14:44:43+00:00", "generator": { "date": "2025-07-16T14:44:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.3" } }, "id": "RHSA-2025:10364", "initial_release_date": "2025-07-07T02:28:52+00:00", "revision_history": [ { "date": "2025-07-07T02:28:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-07-07T02:28:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-16T14:44:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.48.3-2.el7_9.src", "product": { "name": "webkitgtk4-0:2.48.3-2.el7_9.src", "product_id": "webkitgtk4-0:2.48.3-2.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-devel@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.48.3-2.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-devel@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.48.3-2.el7_9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "product": { "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "product_id": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-doc@2.48.3-2.el7_9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.src", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch" }, "product_reference": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.src", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch" }, "product_reference": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-1745", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270151" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the SVG implementation within WebKitGTK. This flaw allows remote attackers to exploit the removal of an SVGFontFaceElement object, which occurs through specific vectors that trigger the deletion of the object during rendering.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1745" }, { "category": "external", "summary": "RHBZ#2270151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270151" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1745", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1745" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1745", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1745" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents" }, { "cve": "CVE-2020-9802", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879545" } ], "notes": [ { "category": "description", "text": "A logic issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows an attacker to process maliciously crafted web content that may lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9802" }, { "category": "external", "summary": "RHBZ#1879545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879545" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9802", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9802" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue may lead to arbitrary code execution" }, { "cve": "CVE-2020-9803", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879557" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. A memory corruption issue could allow processing maliciously crafted web content leading to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9803" }, { "category": "external", "summary": "RHBZ#1879557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879557" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9803", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9803" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption may lead to arbitrary code execution" }, { "cve": "CVE-2020-9805", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879559" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue may lead to cross site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9805" }, { "category": "external", "summary": "RHBZ#1879559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879559" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9805", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9805" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue may lead to cross site scripting" }, { "cve": "CVE-2020-9806", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879563" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkit gtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. A memory corruption issue could allow processing of maliciously crafted web content that could lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9806" }, { "category": "external", "summary": "RHBZ#1879563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879563" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9806", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9806" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption may lead to arbitrary code execution" }, { "cve": "CVE-2020-9807", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879564" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows an attacker to process maliciously crafted web content that may lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9807" }, { "category": "external", "summary": "RHBZ#1879564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9807", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9807" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption may lead to arbitrary code execution" }, { "cve": "CVE-2020-9843", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879566" } ], "notes": [ { "category": "description", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Input validation issue may lead to cross site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9843" }, { "category": "external", "summary": "RHBZ#1879566", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879566" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9843", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9843" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Input validation issue may lead to cross site scripting" }, { "cve": "CVE-2020-9850", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879568" } ], "notes": [ { "category": "description", "text": "A logic issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows a remote attacker to cause arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t shipped any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9850" }, { "category": "external", "summary": "RHBZ#1879568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879568" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9850", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9850" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue may lead to arbitrary code execution" }, { "cve": "CVE-2020-9862", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879532" } ], "notes": [ { "category": "description", "text": "A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Command injection in web inspector", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9862" }, { "category": "external", "summary": "RHBZ#1879532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879532" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9862", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9862" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9862", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9862" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Command injection in web inspector" }, { "cve": "CVE-2020-9893", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879535" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in webkitgtk that affected WebKitGTK versions before 2.28.4 and WPE WebKit versions before 2.28.4. This flaw allows a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9893" }, { "category": "external", "summary": "RHBZ#1879535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879535" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9893", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9893" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9893", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9893" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution" }, { "cve": "CVE-2020-9894", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879536" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in webkitgtk that affected WebKitGTK versions before 2.28.4 and WPE WebKit versions before 2.28.4. This flaw allows a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9894" }, { "category": "external", "summary": "RHBZ#1879536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879536" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9894", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9894" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9894", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9894" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution" }, { "cve": "CVE-2020-9895", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879538" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk in versions prior to 2.28.4 and in WPE WebKit in versions prior to 2.28.4. A use-after-free issue was found allowing a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9895" }, { "category": "external", "summary": "RHBZ#1879538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879538" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9895", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9895" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9895", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9895" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution" }, { "cve": "CVE-2020-9915", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879540" } ], "notes": [ { "category": "description", "text": "An access issue existed in Content Security Policy. This issue was addressed with improved access restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Access issue in content security policy", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9915" }, { "category": "external", "summary": "RHBZ#1879540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9915", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9915" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9915", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9915" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Access issue in content security policy" }, { "cve": "CVE-2020-9925", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879541" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A logic issue may lead to cross site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9925" }, { "category": "external", "summary": "RHBZ#1879541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9925", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9925" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9925", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9925" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A logic issue may lead to cross site scripting" }, { "cve": "CVE-2020-9947", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944331" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use after free issue may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9947" }, { "category": "external", "summary": "RHBZ#1944331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944331" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9947", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9947" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9947", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9947" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use after free issue may lead to arbitrary code execution" }, { "cve": "CVE-2020-9948", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901214" } ], "notes": [ { "category": "description", "text": "A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9948" }, { "category": "external", "summary": "RHBZ#1901214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9948", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9948" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9948", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9948" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: type confusion may lead to arbitrary code execution" }, { "cve": "CVE-2020-9951", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901216" } ], "notes": [ { "category": "description", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9951" }, { "category": "external", "summary": "RHBZ#1901216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9951", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9951" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9951", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9951" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2020-9952", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901219" } ], "notes": [ { "category": "description", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: input validation issue may lead to a cross site scripting", "title": "Vulnerability summary" }, { "category": "other", "text": "webkit2gtk3 as shipped with Red Hat Enterprise Linux 8 is not affected by this flaw, as the version shipped is newer than the affected version range.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9952" }, { "category": "external", "summary": "RHBZ#1901219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9952", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9952" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9952", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9952" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: input validation issue may lead to a cross site scripting" }, { "cve": "CVE-2020-9983", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901221" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds write may lead to code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9983" }, { "category": "external", "summary": "RHBZ#1901221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901221" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9983", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9983" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9983", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9983" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: out-of-bounds write may lead to code execution" }, { "cve": "CVE-2020-13543", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1903568" } ], "notes": [ { "category": "description", "text": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13543" }, { "category": "external", "summary": "RHBZ#1903568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903568" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0009.html", "url": "https://webkitgtk.org/security/WSA-2020-0009.html" } ], "release_date": "2020-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2020-13558", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1928886" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in the AudioSourceProviderGStreamer class of WebKitGTK and WPE WebKit in versions prior to 2.30.5. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13558" }, { "category": "external", "summary": "RHBZ#1928886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928886" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13558", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13558" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0001.html", "url": "https://webkitgtk.org/security/WSA-2021-0001.html" } ], "release_date": "2021-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution" }, { "cve": "CVE-2020-13584", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901212" } ], "notes": [ { "category": "description", "text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13584" }, { "category": "external", "summary": "RHBZ#1901212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13584", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13584" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13584", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13584" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2020-13753", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879570" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. The bubblewrap sandbox failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg- desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal\u2019s input buffer, similar to CVE-2017-5226. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13753" }, { "category": "external", "summary": "RHBZ#1879570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13753", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13753" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl" }, { "cve": "CVE-2020-27918", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944323" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27918" }, { "category": "external", "summary": "RHBZ#1944323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944323" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27918", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27918" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2020-29623", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944329" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A user may be unable to fully delete the browsing history under some circumstances. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: User may be unable to fully delete browsing history", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29623" }, { "category": "external", "summary": "RHBZ#1944329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29623", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29623" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: User may be unable to fully delete browsing history" }, { "cve": "CVE-2021-1765", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944333" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: IFrame sandboxing policy violation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1765" }, { "category": "external", "summary": "RHBZ#1944333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1765", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1765" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1765", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1765" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: IFrame sandboxing policy violation" }, { "cve": "CVE-2021-1788", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944859" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1788" }, { "category": "external", "summary": "RHBZ#1944859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944859" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1788", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1788" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0003.html", "url": "https://webkitgtk.org/security/WSA-2021-0003.html" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-1789", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944337" } ], "notes": [ { "category": "description", "text": "A type confusion vulnerability was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1789" }, { "category": "external", "summary": "RHBZ#1944337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1789", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1789" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-05-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2021-1799", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944340" } ], "notes": [ { "category": "description", "text": "A port redirection issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A malicious website may be able to access restricted ports on arbitrary servers. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Access to restricted ports on arbitrary servers via port redirection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1799" }, { "category": "external", "summary": "RHBZ#1944340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1799", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1799" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Access to restricted ports on arbitrary servers via port redirection" }, { "cve": "CVE-2021-1801", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944343" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: IFrame sandboxing policy violation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1801" }, { "category": "external", "summary": "RHBZ#1944343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944343" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1801", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1801" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: IFrame sandboxing policy violation" }, { "cve": "CVE-2021-1817", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986852" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1817" }, { "category": "external", "summary": "RHBZ#1986852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986852" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1817", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1817" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1817", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1817" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption leading to arbitrary code execution" }, { "cve": "CVE-2021-1820", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986856" } ], "notes": [ { "category": "description", "text": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may result in the disclosure of process memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory initialization issue possibly leading to memory disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1820" }, { "category": "external", "summary": "RHBZ#1986856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1820", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1820" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory initialization issue possibly leading to memory disclosure" }, { "cve": "CVE-2021-1825", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986858" } ], "notes": [ { "category": "description", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iTunes 12.11.3 for Windows, iCloud for Windows 12.3, macOS Big Sur 11.3, Safari 14.1, watchOS 7.4, tvOS 14.5, iOS 14.5 and iPadOS 14.5. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Input validation issue leading to cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1825" }, { "category": "external", "summary": "RHBZ#1986858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986858" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1825", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1825" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1825", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1825" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Input validation issue leading to cross site scripting attack" }, { "cve": "CVE-2021-1826", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986860" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to universal cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1826" }, { "category": "external", "summary": "RHBZ#1986860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1826", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1826" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to universal cross site scripting attack" }, { "cve": "CVE-2021-1844", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944862" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1844" }, { "category": "external", "summary": "RHBZ#1944862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944862" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1844", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1844" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1844", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1844" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0003.html", "url": "https://webkitgtk.org/security/WSA-2021-0003.html" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-1870", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944350" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A remote attacker may be able to cause arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1870" }, { "category": "external", "summary": "RHBZ#1944350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944350" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1870", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1870" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1870", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1870" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to arbitrary code execution" }, { "cve": "CVE-2021-1871", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944867" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. A remote attacker may be able to cause arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1871" }, { "category": "external", "summary": "RHBZ#1944867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1871", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1871" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0003.html", "url": "https://webkitgtk.org/security/WSA-2021-0003.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to arbitrary code execution" }, { "cve": "CVE-2021-21775", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986863" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21775" }, { "category": "external", "summary": "RHBZ#1986863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21775", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21775" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution" }, { "cve": "CVE-2021-21779", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986866" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability exists in the way Webkit\u2019s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21779" }, { "category": "external", "summary": "RHBZ#1986866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986866" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21779", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21779" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution" }, { "cve": "CVE-2021-21806", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1980441" } ], "notes": [ { "category": "description", "text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21806" }, { "category": "external", "summary": "RHBZ#1980441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21806", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21806" }, { "category": "external", "summary": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214" } ], "release_date": "2021-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution" }, { "cve": "CVE-2021-30661", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986870" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a use-after-free in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30661" }, { "category": "external", "summary": "RHBZ#1986870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986870" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30661", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30661" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30661", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30661" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30663", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986872" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by an integer overflow in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Integer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30663" }, { "category": "external", "summary": "RHBZ#1986872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30663", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30663" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30663", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30663" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Integer overflow leading to arbitrary code execution" }, { "cve": "CVE-2021-30665", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986874" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a memory corruption issue in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30665" }, { "category": "external", "summary": "RHBZ#1986874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986874" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30665", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30665" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30665", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30665" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption leading to arbitrary code execution" }, { "cve": "CVE-2021-30666", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986877" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package are vulnerable to a buffer overflow caused by improper bounds checking by the WebKit component. By persuading a victim to visit a specially crafted Web site, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Buffer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30666" }, { "category": "external", "summary": "RHBZ#1986877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30666", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30666" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30666", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30666" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Buffer overflow leading to arbitrary code execution" }, { "cve": "CVE-2021-30682", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986879" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to leak of sensitive user information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30682" }, { "category": "external", "summary": "RHBZ#1986879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986879" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30682", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30682" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30682", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30682" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to leak of sensitive user information" }, { "cve": "CVE-2021-30689", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986881" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to universal cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30689" }, { "category": "external", "summary": "RHBZ#1986881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986881" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30689", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30689" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30689", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30689" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to universal cross site scripting attack" }, { "cve": "CVE-2021-30720", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986883" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious website may be able to access restricted ports on arbitrary servers.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30720" }, { "category": "external", "summary": "RHBZ#1986883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30720", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30720" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers" }, { "cve": "CVE-2021-30734", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986886" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruptions leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30734" }, { "category": "external", "summary": "RHBZ#1986886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986886" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30734", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30734" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30734", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30734" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruptions leading to arbitrary code execution" }, { "cve": "CVE-2021-30744", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986888" } ], "notes": [ { "category": "description", "text": "Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30744" }, { "category": "external", "summary": "RHBZ#1986888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986888" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30744", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30744" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30744", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30744" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack" }, { "cve": "CVE-2021-30749", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986890" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruptions leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30749" }, { "category": "external", "summary": "RHBZ#1986890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30749", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30749" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruptions leading to arbitrary code execution" }, { "cve": "CVE-2021-30758", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986892" } ], "notes": [ { "category": "description", "text": "A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Type confusion leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30758" }, { "category": "external", "summary": "RHBZ#1986892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30758", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30758" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30758", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30758" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Type confusion leading to arbitrary code execution" }, { "cve": "CVE-2021-30761", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986894" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by memory corruption in the WebKit component. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30761" }, { "category": "external", "summary": "RHBZ#1986894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986894" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30761", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30761" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30761", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30761" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption leading to arbitrary code execution" }, { "cve": "CVE-2021-30762", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986898" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a use-after-free in the WebKit component. By persuading a victim to visit a specially crafted Web site, an attacker can execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30762" }, { "category": "external", "summary": "RHBZ#1986898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30762", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30762" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30795", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986900" } ], "notes": [ { "category": "description", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30795" }, { "category": "external", "summary": "RHBZ#1986900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30795", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30795" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30795", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30795" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30797", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986902" } ], "notes": [ { "category": "description", "text": "This issue was addressed with improved checks. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Insufficient checks leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30797" }, { "category": "external", "summary": "RHBZ#1986902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986902" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30797", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30797" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Insufficient checks leading to arbitrary code execution" }, { "cve": "CVE-2021-30799", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986906" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruptions leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30799" }, { "category": "external", "summary": "RHBZ#1986906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986906" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30799", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30799" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruptions leading to arbitrary code execution" }, { "cve": "CVE-2021-30809", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034347" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30809" }, { "category": "external", "summary": "RHBZ#2034347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30809", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30818", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034368" } ], "notes": [ { "category": "description", "text": "A confusion type flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30818" }, { "category": "external", "summary": "RHBZ#2034368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30818", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30823", "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034373" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK. An attacker in a privileged network position could use this flaw to bypass HSTS.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to HSTS bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30823" }, { "category": "external", "summary": "RHBZ#2034373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30823", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to HSTS bypass" }, { "cve": "CVE-2021-30836", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034376" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in WebKitGTK. A specially crafted audio file could use this flaw to trigger a disclosure of memory when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Out-of-bounds read leading to memory disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30836" }, { "category": "external", "summary": "RHBZ#2034376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30836", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30836" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: Out-of-bounds read leading to memory disclosure" }, { "cve": "CVE-2021-30846", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2017898" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30846" }, { "category": "external", "summary": "RHBZ#2017898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30846", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30846" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0006.html", "url": "https://webkitgtk.org/security/WSA-2021-0006.html" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30848", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2017901" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30848" }, { "category": "external", "summary": "RHBZ#2017901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30848", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30848" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0006.html", "url": "https://webkitgtk.org/security/WSA-2021-0006.html" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30849", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2017904" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30849" }, { "category": "external", "summary": "RHBZ#2017904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30849", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30851", "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2018573" } ], "notes": [ { "category": "description", "text": "A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30851" }, { "category": "external", "summary": "RHBZ#2018573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30851", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0006.html", "url": "https://webkitgtk.org/security/WSA-2021-0006.html" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30884", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034378" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way WebKitGTK performed CSS compositing. A malicious web site could possibly use this flaw to reveal user\u0027s browsing history.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: CSS compositing issue leading to revealing of the browsing history", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30884" }, { "category": "external", "summary": "RHBZ#2034378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30884", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: CSS compositing issue leading to revealing of the browsing history" }, { "cve": "CVE-2021-30887", "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034381" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK. A specially crafted web content could use this flaw to bypass Content Security Policy bypass when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to Content Security Policy bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30887" }, { "category": "external", "summary": "RHBZ#2034381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30887", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30887" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to Content Security Policy bypass" }, { "cve": "CVE-2021-30888", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034383" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in WebKitGTK. A malicious web site using Content Security Policy reports could use this flaw to leak information via redirects.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Information leak via Content Security Policy reports", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30888" }, { "category": "external", "summary": "RHBZ#2034383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30888", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Information leak via Content Security Policy reports" }, { "cve": "CVE-2021-30889", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034386" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Buffer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30889" }, { "category": "external", "summary": "RHBZ#2034386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30889", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30889" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Buffer overflow leading to arbitrary code execution" }, { "cve": "CVE-2021-30890", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034389" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK. Specially crafted web content could use this flaw to trigger a universal cross-site scripting when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to universal cross-site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30890" }, { "category": "external", "summary": "RHBZ#2034389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30890", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30890" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to universal cross-site scripting" }, { "cve": "CVE-2021-30897", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2038907" } ], "notes": [ { "category": "description", "text": "A flaw was found in the resource timing API specification and its implementation in WebKitGTK. A malicious web site could use this flaw to trigger a cross-domain data exfiltration.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Cross-origin data exfiltration via resource timing API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30897" }, { "category": "external", "summary": "RHBZ#2038907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30897", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Cross-origin data exfiltration via resource timing API" }, { "cve": "CVE-2021-30934", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044521" } ], "notes": [ { "category": "description", "text": "A buffer overflow vulnerability was found in webkitgtk. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash or lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30934" }, { "category": "external", "summary": "RHBZ#2044521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30934", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30934" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30936", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044528" } ], "notes": [ { "category": "description", "text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30936" }, { "category": "external", "summary": "RHBZ#2044528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30936", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30936" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30951", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044534" } ], "notes": [ { "category": "description", "text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30951" }, { "category": "external", "summary": "RHBZ#2044534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30951", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30951" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30952", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044538" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, which can lead to an integer overflow. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30952" }, { "category": "external", "summary": "RHBZ#2044538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30952", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30952" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30953", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044542" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper bounds checking, which can lead to an out-of-bounds read vulnerability. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30953" }, { "category": "external", "summary": "RHBZ#2044542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30953", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30953" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30954", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044551" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper memory handling, which can lead to a type confusion issue. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30954" }, { "category": "external", "summary": "RHBZ#2044551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30954", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30954" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30984", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044553" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper state handling, which can lead to a race condition. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30984" }, { "category": "external", "summary": "RHBZ#2044553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30984", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30984" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-42762", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2016673" } ], "notes": [ { "category": "description", "text": "BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace. The impact is limited to host services that create UNIX sockets that WebKit mounts inside its sandbox, and the sandboxed process remains otherwise confined. NOTE: this is similar to CVE-2021-41133.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: limited sandbox escape via VFS syscalls", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-42762" }, { "category": "external", "summary": "RHBZ#2016673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016673" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-42762", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42762" } ], "release_date": "2021-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: limited sandbox escape via VFS syscalls" }, { "cve": "CVE-2021-45481", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2040327" } ], "notes": [ { "category": "description", "text": "A segmentation violation vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45481" }, { "category": "external", "summary": "RHBZ#2040327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45481", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45481" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481" } ], "release_date": "2021-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create" }, { "cve": "CVE-2021-45482", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2040329" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45482" }, { "category": "external", "summary": "RHBZ#2040329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45482", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45482" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482" } ], "release_date": "2021-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild" }, { "cve": "CVE-2021-45483", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2040331" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free in WebCore::Frame::page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45483" }, { "category": "external", "summary": "RHBZ#2040331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45483", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45483" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483" } ], "release_date": "2021-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free in WebCore::Frame::page" }, { "cve": "CVE-2022-0108", "discovery_date": "2022-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2037469" } ], "notes": [ { "category": "description", "text": "Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Inappropriate implementation in Navigation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0108" }, { "category": "external", "summary": "RHBZ#2037469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0108", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0108" } ], "release_date": "2022-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Inappropriate implementation in Navigation" }, { "cve": "CVE-2022-22589", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053179" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. The vulnerability exists due to improper input validation in WebKit when processing email messages. This flaw allows a remote attacker to trick the victim into opening a specially crafted email message and execute arbitrary JavaScript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22589" }, { "category": "external", "summary": "RHBZ#2053179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22589", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22589" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0002.html", "url": "https://webkitgtk.org/security/WSA-2022-0002.html" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript" }, { "cve": "CVE-2022-22590", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053181" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22590" }, { "category": "external", "summary": "RHBZ#2053181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22590", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22590" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0002.html", "url": "https://webkitgtk.org/security/WSA-2022-0002.html" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2022-22592", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "discovery_date": "2022-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053185" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. The flaw exists due to a logic issue when processing HTML content in WebKit. This flaw allows a remote attacker to create a specially crafted web page, trick the victim into visiting it, and prevent the Content Security Policy from being enforced, allowing the remote attacker to bypass implemented security restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22592" }, { "category": "external", "summary": "RHBZ#2053185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22592", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22592" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0002.html", "url": "https://webkitgtk.org/security/WSA-2022-0002.html" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced" }, { "cve": "CVE-2022-22594", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2045291" } ], "notes": [ { "category": "description", "text": "A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be able to track sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22594" }, { "category": "external", "summary": "RHBZ#2045291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22594", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2022-22620", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2056474" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a use-after-free error and leading to the execution of arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22620" }, { "category": "external", "summary": "RHBZ#2056474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22620", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0003.html", "url": "https://webkitgtk.org/security/WSA-2022-0003.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2022-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-02-11T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free" }, { "cve": "CVE-2022-22624", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073893" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22624" }, { "category": "external", "summary": "RHBZ#2073893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22624", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22624" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-22628", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073896" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22628" }, { "category": "external", "summary": "RHBZ#2073896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22628", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22628" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-22629", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073899" } ], "notes": [ { "category": "description", "text": "A buffer overflow vulnerability was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Buffer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22629" }, { "category": "external", "summary": "RHBZ#2073899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Buffer overflow leading to arbitrary code execution" }, { "cve": "CVE-2022-22637", "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073903" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: logic issue was addressed with improved state management", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22637" }, { "category": "external", "summary": "RHBZ#2073903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22637", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22637" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: logic issue was addressed with improved state management" }, { "cve": "CVE-2022-22662", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104787" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where an issue occurs due to improper cookie management. This flaw allows a remote attacker to trick the victim into parsing maliciously crafted web content, triggering the vulnerability and gaining access to potentially sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Cookie management issue leading to sensitive user information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22662" }, { "category": "external", "summary": "RHBZ#2104787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22662", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22662" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Cookie management issue leading to sensitive user information disclosure" }, { "cve": "CVE-2022-22677", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104788" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs due to a logic issue in video self-preview feature in a webRTC call, which can be interrupted if the user answers a phone call or the audio capture is interrupted. This flaw allows a remote attacker to perform a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability does not affect RHEL because WebRTC code is not included in any WebKitGTK releases thus far.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22677" }, { "category": "external", "summary": "RHBZ#2104788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22677", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22677" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted" }, { "cve": "CVE-2022-26700", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092732" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26700" }, { "category": "external", "summary": "RHBZ#2092732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26700", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26700" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-26709", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092733" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26709" }, { "category": "external", "summary": "RHBZ#2092733", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26709", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26709" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26710", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104789" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in WebKitGTK. The flaw occurs when processing maliciously crafted HTML content in WebKit. This flaw allows a remote attacker to trick the victim into visiting a specially crafted website, triggering memory corruption and executing arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26710" }, { "category": "external", "summary": "RHBZ#2104789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26710", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26716", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092734" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26716" }, { "category": "external", "summary": "RHBZ#2092734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26716", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-26717", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092735" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26717" }, { "category": "external", "summary": "RHBZ#2092735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26719", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092736" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26719" }, { "category": "external", "summary": "RHBZ#2092736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26719", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-30293", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2082548" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow vulnerability was found in WebKitGTK. The vulnerability occurs when processing or rendering HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a heap buffer overflow error and leading to the execution of arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30293" }, { "category": "external", "summary": "RHBZ#2082548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30293", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30293" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293" } ], "release_date": "2022-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution" }, { "cve": "CVE-2022-30294", "discovery_date": "2022-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2082544" } ], "notes": [ { "category": "description", "text": "[REJECTED CVE] In WebKitGTK through 2.36.0 (and WPE WebKit), there is a use-after-free in WebCore::TextureMapperLayer::setContentsLayer in WebCore/platform/graphics/texmap/TextureMapperLayer.cpp.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw was found to be a duplicate of CVE-2022-30293. Please see https://access.redhat.com/security/cve/CVE-2022-30293 for information about affected products and security errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30294" }, { "category": "external", "summary": "RHBZ#2082544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082544" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30294", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30294" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30294", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30294" } ], "release_date": "2022-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 0.0, "baseSeverity": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "title": "webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer" }, { "cve": "CVE-2022-32792", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238973" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. This issue occurs when processing maliciously crafted web content which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32792" }, { "category": "external", "summary": "RHBZ#2238973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32792", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32792" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2022-0007.html", "url": "https://wpewebkit.org/security/WSA-2022-0007.html" } ], "release_date": "2022-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2022-32816", "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238975" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. This issue occurs when visiting a website that frames malicious content, which may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: malicious content may lead to UI spoofing", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32816" }, { "category": "external", "summary": "RHBZ#2238975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32816", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2022-0007.html", "url": "https://wpewebkit.org/security/WSA-2022-0007.html" } ], "release_date": "2022-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: malicious content may lead to UI spoofing" }, { "cve": "CVE-2022-32885", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236842" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue when processing web content", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32885" }, { "category": "external", "summary": "RHBZ#2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue when processing web content" }, { "cve": "CVE-2022-32886", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128643" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtkm, where a buffer overflow issue was addressed with improved memory handling. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: buffer overflow issue was addressed with improved memory handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32886" }, { "category": "external", "summary": "RHBZ#2128643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32886", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0009.html", "url": "https://webkitgtk.org/security/WSA-2022-0009.html" } ], "release_date": "2022-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: buffer overflow issue was addressed with improved memory handling" }, { "cve": "CVE-2022-32888", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140501" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32888" }, { "category": "external", "summary": "RHBZ#2140501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32888", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking" }, { "cve": "CVE-2022-32891", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128647" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: UI spoofing while Visiting a website that frames malicious content", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32891" }, { "category": "external", "summary": "RHBZ#2128647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32891", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32891" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0009.html", "url": "https://webkitgtk.org/security/WSA-2022-0009.html" } ], "release_date": "2022-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: UI spoofing while Visiting a website that frames malicious content" }, { "cve": "CVE-2022-32893", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2121645" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to an out-of-bounds write. This flaw allows an attacker with network access to pass specially crafted web content files, causing arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Since Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32893" }, { "category": "external", "summary": "RHBZ#2121645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32893", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32893" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32893", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32893" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0008.html", "url": "https://webkitgtk.org/security/WSA-2022-0008.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2022-08-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-08-18T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2022-32912", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128645" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32912" }, { "category": "external", "summary": "RHBZ#2128645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32912", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32912" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32912", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32912" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0009.html", "url": "https://webkitgtk.org/security/WSA-2022-0009.html" } ], "release_date": "2022-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2022-32919", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271437" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK and WPE WebKit that allows a remote attacker to conduct spoofing attacks by exploiting improper UI handling. This flaw enables attackers to create specially crafted websites that can display misleading information to users. By exploiting this vulnerability, an attacker can trick users into believing they are interacting with a legitimate website, potentially leading to a UI spoofing attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32919" }, { "category": "external", "summary": "RHBZ#2271437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271437" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32919", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32919" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32919", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32919" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing." }, { "cve": "CVE-2022-32923", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140502" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. Processing maliciously crafted web content may disclose the internal states of the app.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: correctness issue in the JIT was addressed with improved checks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32923" }, { "category": "external", "summary": "RHBZ#2140502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32923", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: correctness issue in the JIT was addressed with improved checks" }, { "cve": "CVE-2022-32933", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271441" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk where a website may be able to track the websites a user visited in private browsing mode.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A website may able to track visited websites in private browsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32933" }, { "category": "external", "summary": "RHBZ#2271441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32933", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32933" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32933", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32933" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A website may able to track visited websites in private browsing" }, { "cve": "CVE-2022-42799", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: issue was addressed with improved UI handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42799" }, { "category": "external", "summary": "RHBZ#2140503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42799", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: issue was addressed with improved UI handling" }, { "cve": "CVE-2022-42823", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140505" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where a logic issue was addressed with improved state management. Processing maliciously crafted web content may disclose sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42823" }, { "category": "external", "summary": "RHBZ#2140505", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42823", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2022-42824", "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140504" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: sensitive information disclosure issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42824" }, { "category": "external", "summary": "RHBZ#2140504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42824", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42824" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: sensitive information disclosure issue" }, { "cve": "CVE-2022-42826", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2167716" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue exists due to a use-after-free error when processing maliciously crafted web content in WebKit. This may allow an attacker to trick the victim to visit a specially crafted website, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42826" }, { "category": "external", "summary": "RHBZ#2167716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42826", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0001.html", "url": "https://webkitgtk.org/security/WSA-2023-0001.html" } ], "release_date": "2023-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: use-after-free issue leading to arbitrary code execution" }, { "cve": "CVE-2022-42852", "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156986" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory disclosure issue was addressed with improved memory handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42852" }, { "category": "external", "summary": "RHBZ#2156986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42852", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory disclosure issue was addressed with improved memory handling" }, { "cve": "CVE-2022-42856", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2022-12-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2153683" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42856" }, { "category": "external", "summary": "RHBZ#2153683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153683" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42856", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42856" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42856", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42856" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2022-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Setting the environment variable JSC_useFTLJIT=0 will disable the vulnerable code. (This will also somewhat slow down JavaScript execution.)", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-12-14T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution" }, { "cve": "CVE-2022-42863", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156987" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42863" }, { "category": "external", "summary": "RHBZ#2156987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42863", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42863" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-42867", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156989" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42867" }, { "category": "external", "summary": "RHBZ#2156989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42867", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42867" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46691", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156990" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46691" }, { "category": "external", "summary": "RHBZ#2156990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46691", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46691" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46692", "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156991" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Same Origin Policy bypass issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46692" }, { "category": "external", "summary": "RHBZ#2156991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46692", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46692" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Same Origin Policy bypass issue" }, { "cve": "CVE-2022-46698", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156992" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows an attacker to process maliciously crafted web content that may disclose sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: logic issue leading to user information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46698" }, { "category": "external", "summary": "RHBZ#2156992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46698", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: logic issue leading to user information disclosure" }, { "cve": "CVE-2022-46699", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156993" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46699" }, { "category": "external", "summary": "RHBZ#2156993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46699", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46699" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46700", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156994" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46700" }, { "category": "external", "summary": "RHBZ#2156994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46700", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46700" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271444" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This flaw allows a remote attacker to bypass security restrictions and spoof the user\u0027s address bar. This issue occurs when a victim is persuaded to access a specially crafted website due to improper handling of URLs.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46705" }, { "category": "external", "summary": "RHBZ#2271444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46705" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing" }, { "cve": "CVE-2022-46725", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271446" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This flaw occurs due to an issue in the component URL Handler, which allows a remote attacker to manipulate an unknown input that can lead to clickjacking.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46725" }, { "category": "external", "summary": "RHBZ#2271446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271446" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46725" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46725", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46725" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing." }, { "cve": "CVE-2022-48503", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218623" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: improper bounds checking leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-48503" }, { "category": "external", "summary": "RHBZ#2218623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48503", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: improper bounds checking leading to arbitrary code execution" }, { "cve": "CVE-2023-23517", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2167717" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-23517" }, { "category": "external", "summary": "RHBZ#2167717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-23517", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0001.html", "url": "https://webkitgtk.org/security/WSA-2023-0001.html" } ], "release_date": "2023-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2023-23518", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2167715" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-23518" }, { "category": "external", "summary": "RHBZ#2167715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-23518", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0001.html", "url": "https://webkitgtk.org/security/WSA-2023-0001.html" } ], "release_date": "2023-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2023-23529", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2169934" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may, in theory, allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger type confusion, and execute arbitrary code on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-23529" }, { "category": "external", "summary": "RHBZ#2169934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169934" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-23529", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23529" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23529", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23529" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0002.html", "url": "https://webkitgtk.org/security/WSA-2023-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-02-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Setting the environment variable JSC_useDFGJIT=0 will mitigate this issue.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-02-14T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution" }, { "cve": "CVE-2023-25358", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2175099" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-25358" }, { "category": "external", "summary": "RHBZ#2175099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-25358", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25358" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358" }, { "category": "external", "summary": "https://bugs.webkit.org/show_bug.cgi?id=242683", "url": "https://bugs.webkit.org/show_bug.cgi?id=242683" } ], "release_date": "2022-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()" }, { "cve": "CVE-2023-27932", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236843" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may bypass the same-origin Policy.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Same Origin Policy bypass via crafted web content", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-27932" }, { "category": "external", "summary": "RHBZ#2236843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236843" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-27932", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27932" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-27932", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27932" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Same Origin Policy bypass via crafted web content" }, { "cve": "CVE-2023-27954", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236844" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue leads to tracking sensitive user information via a website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Website may be able to track sensitive user information", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-27954" }, { "category": "external", "summary": "RHBZ#2236844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236844" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-27954", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27954" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-27954", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27954" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Website may be able to track sensitive user information" }, { "cve": "CVE-2023-28198", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238943" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. When processing web content, it may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use after free vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as the WebKitGTK package is shipped as a dependency for the Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-28198" }, { "category": "external", "summary": "RHBZ#2238943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238943" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-28198", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0008.html", "url": "https://webkitgtk.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use after free vulnerability" }, { "cve": "CVE-2023-28204", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2209208" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. An out of bounds read may be possible when processing malicious web content, which can lead to information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: an out-of-bounds read when processing malicious content", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-28204" }, { "category": "external", "summary": "RHBZ#2209208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-28204", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-05-22T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: an out-of-bounds read when processing malicious content" }, { "cve": "CVE-2023-28205", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2185724" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. An improper input validation issue may lead to a use-after-free vulnerability. This vulnerability allows attackers with network access to pass specially crafted web content files, causing Denial of Service or Arbitrary Code Execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "WebKitGTK: use-after-free leads to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-28205" }, { "category": "external", "summary": "RHBZ#2185724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-28205", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28205" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-6qjh-p74q-89mv", "url": "https://github.com/advisories/GHSA-6qjh-p74q-89mv" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-04-10T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "WebKitGTK: use-after-free leads to arbitrary code execution" }, { "cve": "CVE-2023-32359", "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271449" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk where a user\u2019s password may be read aloud by a text-to-speech accessibility feature.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: User password may be read aloud by a text-to-speech accessibility feature", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32359" }, { "category": "external", "summary": "RHBZ#2271449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271449" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32359", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32359" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32359", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32359" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: User password may be read aloud by a text-to-speech accessibility feature" }, { "cve": "CVE-2023-32370", "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238944" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. A logic issue was addressed with improved validation.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: content security policy blacklist failure", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as \u0027Moderate\u0027 as the WebKitGTK package is shipped as a dependency for the Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32370" }, { "category": "external", "summary": "RHBZ#2238944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238944" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32370", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32370" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32370", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32370" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0008.html", "url": "https://webkitgtk.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: content security policy blacklist failure" }, { "cve": "CVE-2023-32373", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2209214" } ], "notes": [ { "category": "description", "text": "A use after free vulnerability was found in the webkitgtk package. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: a use-after-free when processing maliciously crafted web content", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32373" }, { "category": "external", "summary": "RHBZ#2209214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32373", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32373" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-05-22T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: a use-after-free when processing maliciously crafted web content" }, { "cve": "CVE-2023-32393", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-07-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2224608" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32393" }, { "category": "external", "summary": "RHBZ#2224608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224608" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32393", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32393" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32393", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32393" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0006.html", "url": "https://webkitgtk.org/security/WSA-2023-0006.html" } ], "release_date": "2023-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-32435", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218626" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32435" }, { "category": "external", "summary": "RHBZ#2218626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32435", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0005.html", "url": "https://webkitgtk.org/security/WSA-2023-0005.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-06-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2023-32439", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218640" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing maliciously crafted web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32439" }, { "category": "external", "summary": "RHBZ#2218640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32439", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0005.html", "url": "https://webkitgtk.org/security/WSA-2023-0005.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useDFGJIT=0, which will disable the data flow graph JIT tier. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-06-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2023-35074", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241403" } ], "notes": [ { "category": "description", "text": "The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-35074" }, { "category": "external", "summary": "RHBZ#2241403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241403" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-35074", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-37450", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2223000" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37450" }, { "category": "external", "summary": "RHBZ#2223000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37450", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-07-13T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38133", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231015" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK, which exists due to excessive data output in WebKit Process Model. This issue occurs when processing malicious web content, which may lead to sensitive information disclosure to unauthorized attackers.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: disclose sensitive information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38133" }, { "category": "external", "summary": "RHBZ#2231015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38133", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38133" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38133", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38133" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: disclose sensitive information" }, { "cve": "CVE-2023-38572", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231028" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This flaw exists due to an error when handling the Same Origin Policy. A remote attacker can bypass Same Origin Policy restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: bypass Same Origin Policy", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38572" }, { "category": "external", "summary": "RHBZ#2231028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38572", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38572" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38572", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38572" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: bypass Same Origin Policy" }, { "cve": "CVE-2023-38592", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231017" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38592" }, { "category": "external", "summary": "RHBZ#2231017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231017" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38592", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38592" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38592", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38592" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-38594", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231018" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38594" }, { "category": "external", "summary": "RHBZ#2231018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38594", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38595", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231019" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38595" }, { "category": "external", "summary": "RHBZ#2231019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38595", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38595" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38597", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231043" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38597" }, { "category": "external", "summary": "RHBZ#2231043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231043" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38597", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38597" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38597", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38597" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38599", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231020" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK, which exists due to a logic issue in WebKit related to a user\u0027s privacy. A remote attacker may be able to track sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: track sensitive user information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38599" }, { "category": "external", "summary": "RHBZ#2231020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38599", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38599" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38599", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38599" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: track sensitive user information" }, { "cve": "CVE-2023-38600", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231021" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38600" }, { "category": "external", "summary": "RHBZ#2231021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231021" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38600", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38600" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38600", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38600" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38611", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231022" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38611" }, { "category": "external", "summary": "RHBZ#2231022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38611", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38611" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38611", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38611" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-39928", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241400" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the WebKitGTK\u0027s MediaRecorder API that may lead to memory corruption and Remote Code Execution. The victim needs to access a malicious web page to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-39928" }, { "category": "external", "summary": "RHBZ#2241400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241400" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-39928", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39928" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39928", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39928" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0009.html", "url": "https://webkitgtk.org/security/WSA-2023-0009.html" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports" }, { "cve": "CVE-2023-40397", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238945" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary javascript code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40397" }, { "category": "external", "summary": "RHBZ#2238945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40397" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2023-0008.html", "url": "https://wpewebkit.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: arbitrary javascript code execution" }, { "cve": "CVE-2023-40414", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270143" } ], "notes": [ { "category": "description", "text": "A vulnerability in WebKitGTK and WPE WebKit could allow an attacker to execute arbitrary code on a target system. The issue arises from a use-after-free flaw in memory management when processing web content. This flaw can potentially give attackers the ability to take control of affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40414" }, { "category": "external", "summary": "RHBZ#2270143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270143" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40414", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40414" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40414", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40414" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-40451", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241409" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. An attacker may be able to execute JavaScript code to trigger Remote Code Execution, resulting in a high impact on data confidentiality, integrity, and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40451" }, { "category": "external", "summary": "RHBZ#2241409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40451", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40451" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40451", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40451" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0009.html", "url": "https://webkitgtk.org/security/WSA-2023-0009.html" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code" }, { "cve": "CVE-2023-41074", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241412" } ], "notes": [ { "category": "description", "text": "The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41074" }, { "category": "external", "summary": "RHBZ#2241412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41074", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-41983", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271453" } ], "notes": [ { "category": "description", "text": "A vulnerability in WebKitGTK and WPE WebKit may result in a denial-of-service when processing web content. This issue arises from improper memory handling, which could be exploited by attackers to crash the affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41983" }, { "category": "external", "summary": "RHBZ#2271453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41983", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41983" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41983", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41983" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial of service" }, { "cve": "CVE-2023-41993", "discovery_date": "2023-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2240522" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing malicious web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue doesn\u0027t affect the versions of webkitgtk as shipped with Red Hat Enterprise Linux 8 and 9 as the flaw relies on JIT engine. JIT was disabled in the past when the fixes for CVE-2023-32435 and CVE-2023-32439 were released.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41993" }, { "category": "external", "summary": "RHBZ#2240522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41993", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41993" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-09-25T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing malicious web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42833", "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270146" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This flaw allows a remote attacker to trigger arbitrary code execution by persuading a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated Important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42833" }, { "category": "external", "summary": "RHBZ#2270146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42833", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42833" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42843", "discovery_date": "2024-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271717" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit that may allow a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. By tricking a victim into visiting a specially crafted website, the attacker could perform address bar spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: visiting a malicious website may lead to address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42843" }, { "category": "external", "summary": "RHBZ#2271717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271717" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42843", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42843" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0002.html", "url": "https://webkitgtk.org/security/WSA-2024-0002.html" } ], "release_date": "2024-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: visiting a malicious website may lead to address bar spoofing" }, { "cve": "CVE-2023-42852", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271456" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42852" }, { "category": "external", "summary": "RHBZ#2271456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42875", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T12:59:19.828000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366497" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42875" }, { "category": "external", "summary": "RHBZ#2366497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42883", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2254326" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue exists due to a boundary error when processing a malicious image, which could result in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing a malicious image may lead to a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42883" }, { "category": "external", "summary": "RHBZ#2254326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254326" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42883", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42883" } ], "release_date": "2023-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing a malicious image may lead to a denial of service" }, { "cve": "CVE-2023-42890", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2254327" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue exists due to a boundary error when processing malicious HTML content in WebKit, which could result in memory corruption and arbitrary code execution on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing malicious web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While the discovered flaw in WebKitGTK does indeed present a concerning potential for arbitrary code execution due to memory corruption, its severity is assessed as moderate rather than critical for several reasons. Firstly, successful exploitation of the vulnerability requires the user to interact with malicious HTML content, typically through visiting a compromised website. This dependency on user interaction reduces the likelihood of widespread exploitation compared to vulnerabilities that can be remotely exploited without user interaction. Additionally, the impact of the flaw may be mitigated by various security measures such as sandboxing or Content Security Policy (CSP) enforcement, which can limit the execution environment for potentially malicious code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42890" }, { "category": "external", "summary": "RHBZ#2254327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254327" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42890", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42890" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42890", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42890" } ], "release_date": "2023-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing malicious web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42916", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253054" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may cause an out-of-bounds read due to an improper input validation, resulting in sensitive content leaking.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Out-of-bounds read leads to sensitive data leak", "title": "Vulnerability summary" }, { "category": "other", "text": "The WebKitGTK package versions, as shipped with Red Hat Enterprise 8 and 9, are not affected by this vulnerability. This flaw is related to the JIT code, which is currently disabled by default on both Red Hat Enterprise Linux versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42916" }, { "category": "external", "summary": "RHBZ#2253054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253054" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42916", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-12-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-12-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Out-of-bounds read leads to sensitive data leak" }, { "cve": "CVE-2023-42917", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253058" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Arbitrary Remote Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42917" }, { "category": "external", "summary": "RHBZ#2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42917" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0011.html", "url": "https://webkitgtk.org/security/WSA-2023-0011.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-12-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Arbitrary Remote Code Execution" }, { "cve": "CVE-2023-42950", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271718" } ], "notes": [ { "category": "description", "text": "A heap use-after-free vulnerability was found in WebKit. Exploiting this flaw involves processing maliciously crafted web content, which may result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: heap use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42950" }, { "category": "external", "summary": "RHBZ#2271718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271718" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42950", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42950" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42950", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42950" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0002.html", "url": "https://webkitgtk.org/security/WSA-2024-0002.html" } ], "release_date": "2024-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: heap use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2023-42956", "discovery_date": "2024-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271719" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This issue may allow an attacker to trigger a denial of service condition by convincing a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing malicious web content may lead to a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42956" }, { "category": "external", "summary": "RHBZ#2271719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271719" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42956", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42956" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42956", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42956" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0002.html", "url": "https://webkitgtk.org/security/WSA-2024-0002.html" } ], "release_date": "2024-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing malicious web content may lead to a denial of service" }, { "cve": "CVE-2023-42970", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:01:32.590000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366498" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42970" }, { "category": "external", "summary": "RHBZ#2366498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42970" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-4558", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2279689" } ], "notes": [ { "category": "description", "text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in ANGLE", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4558" }, { "category": "external", "summary": "RHBZ#2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558" } ], "release_date": "2024-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in ANGLE" }, { "cve": "CVE-2024-23213", "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270141" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK\u00a0. This flaw allows a remote attacker to trigger arbitrary code execution by persuading a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23213" }, { "category": "external", "summary": "RHBZ#2270141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23213", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23213" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-23222", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259893" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23222" }, { "category": "external", "summary": "RHBZ#2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-01-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: type confusion may lead to arbitrary code execution" }, { "cve": "CVE-2024-23252", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270288" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows an attacker to trigger a denial of service condition by convincing a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing malicious web content may lead to denial-of-service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23252" }, { "category": "external", "summary": "RHBZ#2270288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270288" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23252", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23252" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing malicious web content may lead to denial-of-service" }, { "cve": "CVE-2024-23254", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270289" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit, where a remote attacker is able to exfiltrate audio data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: malicious website may exfiltrate audio data cross-origin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23254" }, { "category": "external", "summary": "RHBZ#2270289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270289" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23254" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: malicious website may exfiltrate audio data cross-origin" }, { "cve": "CVE-2024-23263", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270290" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions due to a logic issue by convincing a victim to visit a specially crafted website. This results in the attacker evading the Content Security Policy enforcement.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing malicious web content prevents Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23263" }, { "category": "external", "summary": "RHBZ#2270290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270290" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23263", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23263" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23263", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23263" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing malicious web content prevents Content Security Policy from being enforced" }, { "cve": "CVE-2024-23271", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2024-09-25T15:33:21.499000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314696" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows a remote attacker to trigger unexpected cross-origin behavior via a malicious website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may cause unexpected cross-origin behavior", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23271" }, { "category": "external", "summary": "RHBZ#2314696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23271", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23271" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may cause unexpected cross-origin behavior" }, { "cve": "CVE-2024-23280", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270291" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions through an injection issue by persuading a victim to access a specially crafted website, enabling the attackers to fingerprint the user.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: maliciously crafted webpage may be able to fingerprint the user", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23280" }, { "category": "external", "summary": "RHBZ#2270291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23280", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23280" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23280", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23280" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: maliciously crafted webpage may be able to fingerprint the user" }, { "cve": "CVE-2024-23284", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270292" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions due to a logic flaw by persuading a victim to access a specially crafted website, enabling attackers to circumvent the Content Security Policy enforcement.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23284" }, { "category": "external", "summary": "RHBZ#2270292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270292" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23284", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23284" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced" }, { "cve": "CVE-2024-27808", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:36:18.356000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314697" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27808" }, { "category": "external", "summary": "RHBZ#2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27820", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:37:48.081000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314698" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27820" }, { "category": "external", "summary": "RHBZ#2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27833", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:40:34.042000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314700" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27833" }, { "category": "external", "summary": "RHBZ#2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27834", "cwe": { "id": "CWE-288", "name": "Authentication Bypass Using an Alternate Path or Channel" }, "discovery_date": "2024-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2282412" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Webkit. This flaw allows an attacker with arbitrary read and write capability to bypass pointer authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: pointer authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27834" }, { "category": "external", "summary": "RHBZ#2282412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27834" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0003.html", "url": "https://webkitgtk.org/security/WSA-2024-0003.html" } ], "release_date": "2024-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: pointer authentication bypass" }, { "cve": "CVE-2024-27838", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2024-09-25T15:42:35.706000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314702" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This vulnerability allows a maliciously crafted webpage to fingerprint the user.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27838" }, { "category": "external", "summary": "RHBZ#2314702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27838", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user" }, { "cve": "CVE-2024-27851", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:44:41.235000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314704" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27851" }, { "category": "external", "summary": "RHBZ#2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27856", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2025-02-10T09:34:34.705418+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344618" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27856" }, { "category": "external", "summary": "RHBZ#2344618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27856" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856" }, { "category": "external", "summary": "https://support.apple.com/en-us/120896", "url": "https://support.apple.com/en-us/120896" }, { "category": "external", "summary": "https://support.apple.com/en-us/120898", "url": "https://support.apple.com/en-us/120898" }, { "category": "external", "summary": "https://support.apple.com/en-us/120901", "url": "https://support.apple.com/en-us/120901" }, { "category": "external", "summary": "https://support.apple.com/en-us/120902", "url": "https://support.apple.com/en-us/120902" }, { "category": "external", "summary": "https://support.apple.com/en-us/120903", "url": "https://support.apple.com/en-us/120903" }, { "category": "external", "summary": "https://support.apple.com/en-us/120905", "url": "https://support.apple.com/en-us/120905" }, { "category": "external", "summary": "https://support.apple.com/en-us/120906", "url": "https://support.apple.com/en-us/120906" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-15T19:35:57.075000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution" }, { "cve": "CVE-2024-40776", "discovery_date": "2024-07-30T20:48:03+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2301841" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40776" }, { "category": "external", "summary": "RHBZ#2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html", "url": "https://webkitgtk.org/security/WSA-2024-0004.html" } ], "release_date": "2024-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution" }, { "cve": "CVE-2024-40779", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:05:50+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302070" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40779" }, { "category": "external", "summary": "RHBZ#2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40780", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:07:22+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302069" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40780" }, { "category": "external", "summary": "RHBZ#2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40782", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-07-31T14:57:24+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302071" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40782" }, { "category": "external", "summary": "RHBZ#2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management" }, { "cve": "CVE-2024-40789", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:39:05+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302067" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40789" }, { "category": "external", "summary": "RHBZ#2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-40866", "discovery_date": "2024-09-17T00:31:06.549134+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2312724" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. The attacker could perform address bar spoofing by tricking a victim into visiting a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40866" }, { "category": "external", "summary": "RHBZ#2312724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866" }, { "category": "external", "summary": "https://support.apple.com/en-us/121238", "url": "https://support.apple.com/en-us/121238" }, { "category": "external", "summary": "https://support.apple.com/en-us/121241", "url": "https://support.apple.com/en-us/121241" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-17T00:15:49.840000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing" }, { "cve": "CVE-2024-44185", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T20:05:39.339000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323263" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44185" }, { "category": "external", "summary": "RHBZ#2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0006.html", "url": "https://webkitgtk.org/security/WSA-2024-0006.html" } ], "release_date": "2024-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44187", "discovery_date": "2024-09-25T15:50:57.927000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314706" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to exfiltrate data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44187" }, { "category": "external", "summary": "RHBZ#2314706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44187", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2024-44192", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-03-20T12:50:04.459000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2353871" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper checks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThis issue can cause an unexpected process crash. Additionally, there is no evidence of remote code execution but this possibility is not discarded.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44192" }, { "category": "external", "summary": "RHBZ#2353871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353871" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44192", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44192" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0002.html", "url": "https://webkitgtk.org/security/WSA-2025-0002.html" } ], "release_date": "2025-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44244", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T21:06:58.389000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323278" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44244" }, { "category": "external", "summary": "RHBZ#2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244" } ], "release_date": "2024-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44296", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2024-11-01T21:16:26.289000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323289" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing maliciously crafted web content may prevent the Content Security Policy from being enforced. This issue leads to items that were banned from running to be executed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44296" }, { "category": "external", "summary": "RHBZ#2323289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44296", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44296" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296" } ], "release_date": "2024-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced" }, { "cve": "CVE-2024-44308", "discovery_date": "2024-11-21T23:02:37.337000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2327931" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in WebKitGTK\u0027s JIT compiler. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "In order to exploit this vulnerability, the WebKitGTK JIT engine must be enabled and an attacker needs to trick a user into processing or loading malicious web content. This feature is disabled in Red Hat Enterprise Linux versions 8 and 9, meaning these releases are not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44308" }, { "category": "external", "summary": "RHBZ#2327931", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327931" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44308", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44308" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44308", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44308" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-11-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nAffected installations of Red Hat Enterprise Linux 7 can disable the JIT engine by setting the JavaScriptCoreUseJIT environment variable to 0.\n\nAdditionally, in Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-11-21T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-44309", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2024-11-21T22:51:08.987000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2327927" } ], "notes": [ { "category": "description", "text": "A data isolation bypass vulnerability was discovered in WebKitGTK. Processing maliciously crafted web content could enable a cross-site scripting (XSS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: data isolation bypass vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as IMPORTANT severity due to a cookie management issue that allows an attacker to inject maliciously crafted web content, potentially leading to a cross-site scripting (XSS) attack, this flaw occurs because of improper state management during cookie handling, which could allow unauthorized script execution.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44309" }, { "category": "external", "summary": "RHBZ#2327927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44309", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44309" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44309", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44309" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-11-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-11-21T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: data isolation bypass vulnerability" }, { "cve": "CVE-2024-54467", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-03-20T12:50:18.647000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2353872" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate data cross-origin due to a cookie management issue related to improper state management.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into visiting a malicious website.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54467" }, { "category": "external", "summary": "RHBZ#2353872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54467", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54467" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54467", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54467" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0002.html", "url": "https://webkitgtk.org/security/WSA-2025-0002.html" } ], "release_date": "2025-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2024-54479", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "discovery_date": "2024-12-23T13:16:54.800976+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333841" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. In affected versions of this package, processing maliciously crafted web content may lead to an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as an Important severity because an attacker can process maliciously crafted web content, potentially leading to an unexpected process crash. This issue can disrupt the system stability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54479" }, { "category": "external", "summary": "RHBZ#2333841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54479", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54479" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54479", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54479" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121838", "url": "https://support.apple.com/en-us/121838" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:57:33.957000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54502", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-12-23T13:18:24.328627+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333843" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Webkit. Processing maliciously crafted web content may lead to an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54502" }, { "category": "external", "summary": "RHBZ#2333843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54502", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54502" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:51.903000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54505", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2024-12-23T13:18:27.108126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333844" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a type confusion issue due to improper memory handling, causing memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54505" }, { "category": "external", "summary": "RHBZ#2333844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54505", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54505" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121838", "url": "https://support.apple.com/en-us/121838" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:31.052000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2024-54508", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-12-23T13:18:30.107103+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333845" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54508" }, { "category": "external", "summary": "RHBZ#2333845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54508", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54508" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54508", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54508" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:14.487000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54534", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-12-23T13:18:32.596325+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333846" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54534" }, { "category": "external", "summary": "RHBZ#2333846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:39.974000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2024-54543", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-02-10T09:37:24.253576+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344619" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54543" }, { "category": "external", "summary": "RHBZ#2344619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54543", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54543" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2025-01-27T21:46:30.578000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2024-54551", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:23:49.963000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357909" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54551" }, { "category": "external", "summary": "RHBZ#2357909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357909" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54551", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54551" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial-of-service" }, { "cve": "CVE-2024-54658", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-02-11T16:12:08.426000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344946" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54658" }, { "category": "external", "summary": "RHBZ#2344946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344946" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54658", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54658" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54658", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54658" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial-of-service" }, { "cve": "CVE-2025-24143", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2025-02-10T09:40:08.138428+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344621" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. A maliciously crafted web page may be able to fingerprint the user due to improper access restrictions to the file system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into visiting a maliciously crafted web page.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24143" }, { "category": "external", "summary": "RHBZ#2344621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24143", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24143" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" } ], "release_date": "2025-01-27T21:46:05.639000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not visit untrusted web pages or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user" }, { "cve": "CVE-2025-24150", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2025-02-10T09:41:46.644580+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344622" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Copying a URL from Web Inspector may lead to command injection due to improper file handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Copying a URL from Web Inspector may lead to command injection", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into performing unlikely actions, such as enabling and opening the web inspector in an application and loading malicious web content into it. For this reason, this flaw has been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24150" }, { "category": "external", "summary": "RHBZ#2344622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24150", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24150" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24150", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24150" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" } ], "release_date": "2025-01-27T21:46:32.259000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Copying a URL from Web Inspector may lead to command injection" }, { "cve": "CVE-2025-24158", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-02-10T09:43:02.859455+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344623" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24158" }, { "category": "external", "summary": "RHBZ#2344623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24158", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24158" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24158", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24158" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122071", "url": "https://support.apple.com/en-us/122071" }, { "category": "external", "summary": "https://support.apple.com/en-us/122072", "url": "https://support.apple.com/en-us/122072" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-27T21:45:49.015000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial-of-service" }, { "cve": "CVE-2025-24162", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-02-10T09:44:11.167306+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344624" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper state management.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThis issue can cause an unexpected process crash. Additionally, there is no evidence of remote code execution but this possibility is not discarded.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24162" }, { "category": "external", "summary": "RHBZ#2344624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24162", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24162" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24162", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24162" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122071", "url": "https://support.apple.com/en-us/122071" }, { "category": "external", "summary": "https://support.apple.com/en-us/122072", "url": "https://support.apple.com/en-us/122072" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-27T21:45:54.015000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2025-24201", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-03-12T22:35:00.430000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2351802" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds write due to improper checks to prevent unauthorized actions, causing a break out of Web Content sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds write vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is only a risk for servers which utilize a GUI for system administration. This vulnerability can only be exploited when specific packages are used with a graphical interface to process untrusted web content, via GNOME for example.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24201" }, { "category": "external", "summary": "RHBZ#2351802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351802" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24201", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24201" }, { "category": "external", "summary": "https://support.apple.com/en-us/122281", "url": "https://support.apple.com/en-us/122281" }, { "category": "external", "summary": "https://support.apple.com/en-us/122284", "url": "https://support.apple.com/en-us/122284" }, { "category": "external", "summary": "https://support.apple.com/en-us/122285", "url": "https://support.apple.com/en-us/122285" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0002.html", "url": "https://webkitgtk.org/security/WSA-2025-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2025-03-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Systems which do not rely on a GUI for system administration (commonly referred to as \"headless\") should confirm that GNOME shell and WebKitGTK are not present on the system.\n\nWebKitGTK3 is no longer used and can therefore be uninstalled without consequence.\n\nWebKitGTK4 is used in Red Hat Enterprise Linux 7 by the following packages: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nTo mitigate this vulnerability, consider removing certain GNOME packages. Note that uninstalling these packages will break functionality in GNOME, however the server can still be used via the terminal interface.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2025-03-13T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: out-of-bounds write vulnerability" }, { "cve": "CVE-2025-24208", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2025-04-07T14:26:09.363000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357910" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Loading a malicious iframe can cause a cross-site scripting attack due to permissions issues.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24208" }, { "category": "external", "summary": "RHBZ#2357910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357910" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24208", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24208" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24208", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24208" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack" }, { "cve": "CVE-2025-24209", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2025-04-07T14:27:43.092000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357911" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a buffer overflow due to improper memory handling and result in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24209" }, { "category": "external", "summary": "RHBZ#2357911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24209", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24209" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2025-24213", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2025-04-07T14:28:47.281000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357913" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper handling of floats and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A type confusion issue could lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThe x86_64 architecture is not vulnerable to this issue, the x86 architecture is not vulnerable when the SSE2 instruction set is enabled, all other architectures are vulnerable to this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24213" }, { "category": "external", "summary": "RHBZ#2357913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24213", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24213" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: A type confusion issue could lead to memory corruption" }, { "cve": "CVE-2025-24216", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:29:49.645000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357917" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24216" }, { "category": "external", "summary": "RHBZ#2357917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357917" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24216", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24216" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24216", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24216" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-24223", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:03:40.562000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366499" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24223" }, { "category": "external", "summary": "RHBZ#2366499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24223" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-24264", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:31:23.097000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357918" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24264" }, { "category": "external", "summary": "RHBZ#2357918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24264" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-30427", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-04-07T14:32:29.265000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357919" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-30427" }, { "category": "external", "summary": "RHBZ#2357919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357919" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-30427", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-30427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30427" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31204", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-05-15T13:04:43.281000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366500" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31204" }, { "category": "external", "summary": "RHBZ#2366500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-31205", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-05-15T13:05:47.441000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366501" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. A malicious website may steal data cross-origin due to improper security checks within the web browser or rendering engine, leading to unauthorized disclosure of information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into visiting a malicious website.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31205" }, { "category": "external", "summary": "RHBZ#2366501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366501" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31205", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31205" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2025-31206", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2025-05-15T13:06:54.355000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366502" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31206" }, { "category": "external", "summary": "RHBZ#2366502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31215", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2025-05-15T13:07:56.027000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366503" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31215" }, { "category": "external", "summary": "RHBZ#2366503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2025-31257", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:08:57.791000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366504" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in an unexpected crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31257" }, { "category": "external", "summary": "RHBZ#2366504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31257", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31257" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31257", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31257" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" } ] }
opensuse-su-2024:11985-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
libQt5Pdf5-5.15.9-1.1 on GA media
Notes
Title of the patch
libQt5Pdf5-5.15.9-1.1 on GA media
Description of the patch
These are all security issues fixed in the libQt5Pdf5-5.15.9-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11985
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "libQt5Pdf5-5.15.9-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the libQt5Pdf5-5.15.9-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11985", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11985-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0100 page", "url": "https://www.suse.com/security/cve/CVE-2022-0100/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0102 page", "url": "https://www.suse.com/security/cve/CVE-2022-0102/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0103 page", "url": "https://www.suse.com/security/cve/CVE-2022-0103/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0104 page", "url": "https://www.suse.com/security/cve/CVE-2022-0104/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0108 page", "url": "https://www.suse.com/security/cve/CVE-2022-0108/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0109 page", "url": "https://www.suse.com/security/cve/CVE-2022-0109/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0111 page", "url": "https://www.suse.com/security/cve/CVE-2022-0111/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0113 page", "url": "https://www.suse.com/security/cve/CVE-2022-0113/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0116 page", "url": "https://www.suse.com/security/cve/CVE-2022-0116/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0289 page", "url": "https://www.suse.com/security/cve/CVE-2022-0289/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0291 page", "url": "https://www.suse.com/security/cve/CVE-2022-0291/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0293 page", "url": "https://www.suse.com/security/cve/CVE-2022-0293/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0298 page", "url": "https://www.suse.com/security/cve/CVE-2022-0298/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0305 page", "url": "https://www.suse.com/security/cve/CVE-2022-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0306 page", "url": "https://www.suse.com/security/cve/CVE-2022-0306/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0310 page", "url": "https://www.suse.com/security/cve/CVE-2022-0310/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0456 page", "url": "https://www.suse.com/security/cve/CVE-2022-0456/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0459 page", "url": "https://www.suse.com/security/cve/CVE-2022-0459/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0460 page", "url": "https://www.suse.com/security/cve/CVE-2022-0460/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0461 page", "url": "https://www.suse.com/security/cve/CVE-2022-0461/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0606 page", "url": "https://www.suse.com/security/cve/CVE-2022-0606/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0607 page", "url": "https://www.suse.com/security/cve/CVE-2022-0607/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0608 page", "url": "https://www.suse.com/security/cve/CVE-2022-0608/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0609 page", "url": "https://www.suse.com/security/cve/CVE-2022-0609/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0610 page", "url": "https://www.suse.com/security/cve/CVE-2022-0610/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23852 page", "url": "https://www.suse.com/security/cve/CVE-2022-23852/" } ], "title": "libQt5Pdf5-5.15.9-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11985-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libQt5Pdf5-5.15.9-1.1.aarch64", "product": { "name": "libQt5Pdf5-5.15.9-1.1.aarch64", "product_id": "libQt5Pdf5-5.15.9-1.1.aarch64" } }, { "category": "product_version", "name": "libQt5PdfWidgets5-5.15.9-1.1.aarch64", "product": { "name": "libQt5PdfWidgets5-5.15.9-1.1.aarch64", "product_id": "libQt5PdfWidgets5-5.15.9-1.1.aarch64" } }, { "category": "product_version", "name": "libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "product": { "name": "libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "product_id": "libqt5-qtpdf-devel-5.15.9-1.1.aarch64" } }, { "category": "product_version", "name": "libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "product": { "name": "libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "product_id": "libqt5-qtpdf-examples-5.15.9-1.1.aarch64" } }, { "category": "product_version", "name": "libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "product": { "name": "libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "product_id": "libqt5-qtpdf-imports-5.15.9-1.1.aarch64" } }, { "category": "product_version", "name": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "product": { "name": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "product_id": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64" } }, { "category": "product_version", "name": "libqt5-qtwebengine-5.15.9-1.1.aarch64", "product": { "name": "libqt5-qtwebengine-5.15.9-1.1.aarch64", "product_id": "libqt5-qtwebengine-5.15.9-1.1.aarch64" } }, { "category": "product_version", "name": "libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "product": { "name": "libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "product_id": "libqt5-qtwebengine-devel-5.15.9-1.1.aarch64" } }, { "category": "product_version", "name": "libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "product": { "name": "libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "product_id": "libqt5-qtwebengine-examples-5.15.9-1.1.aarch64" } }, { "category": "product_version", "name": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "product": { "name": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "product_id": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libQt5Pdf5-5.15.9-1.1.ppc64le", "product": { "name": "libQt5Pdf5-5.15.9-1.1.ppc64le", "product_id": "libQt5Pdf5-5.15.9-1.1.ppc64le" } }, { "category": "product_version", "name": "libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "product": { "name": "libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "product_id": "libQt5PdfWidgets5-5.15.9-1.1.ppc64le" } }, { "category": "product_version", "name": "libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "product": { "name": "libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "product_id": "libqt5-qtpdf-devel-5.15.9-1.1.ppc64le" } }, { "category": "product_version", "name": "libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "product": { "name": "libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "product_id": "libqt5-qtpdf-examples-5.15.9-1.1.ppc64le" } }, { "category": "product_version", "name": "libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "product": { "name": "libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "product_id": "libqt5-qtpdf-imports-5.15.9-1.1.ppc64le" } }, { "category": "product_version", "name": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "product": { "name": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "product_id": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le" } }, { "category": "product_version", "name": "libqt5-qtwebengine-5.15.9-1.1.ppc64le", "product": { "name": "libqt5-qtwebengine-5.15.9-1.1.ppc64le", "product_id": "libqt5-qtwebengine-5.15.9-1.1.ppc64le" } }, { "category": "product_version", "name": "libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "product": { "name": "libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "product_id": "libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le" } }, { "category": "product_version", "name": "libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "product": { "name": "libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "product_id": "libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le" } }, { "category": "product_version", "name": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "product": { "name": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "product_id": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libQt5Pdf5-5.15.9-1.1.s390x", "product": { "name": "libQt5Pdf5-5.15.9-1.1.s390x", "product_id": "libQt5Pdf5-5.15.9-1.1.s390x" } }, { "category": "product_version", "name": "libQt5PdfWidgets5-5.15.9-1.1.s390x", "product": { "name": "libQt5PdfWidgets5-5.15.9-1.1.s390x", "product_id": "libQt5PdfWidgets5-5.15.9-1.1.s390x" } }, { "category": "product_version", "name": "libqt5-qtpdf-devel-5.15.9-1.1.s390x", "product": { "name": "libqt5-qtpdf-devel-5.15.9-1.1.s390x", "product_id": "libqt5-qtpdf-devel-5.15.9-1.1.s390x" } }, { "category": "product_version", "name": "libqt5-qtpdf-examples-5.15.9-1.1.s390x", "product": { "name": "libqt5-qtpdf-examples-5.15.9-1.1.s390x", "product_id": "libqt5-qtpdf-examples-5.15.9-1.1.s390x" } }, { "category": "product_version", "name": "libqt5-qtpdf-imports-5.15.9-1.1.s390x", "product": { "name": "libqt5-qtpdf-imports-5.15.9-1.1.s390x", "product_id": "libqt5-qtpdf-imports-5.15.9-1.1.s390x" } }, { "category": "product_version", "name": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "product": { "name": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "product_id": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x" } }, { "category": "product_version", "name": "libqt5-qtwebengine-5.15.9-1.1.s390x", "product": { "name": "libqt5-qtwebengine-5.15.9-1.1.s390x", "product_id": "libqt5-qtwebengine-5.15.9-1.1.s390x" } }, { "category": "product_version", "name": "libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "product": { "name": "libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "product_id": "libqt5-qtwebengine-devel-5.15.9-1.1.s390x" } }, { "category": "product_version", "name": "libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "product": { "name": "libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "product_id": "libqt5-qtwebengine-examples-5.15.9-1.1.s390x" } }, { "category": "product_version", "name": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "product": { "name": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "product_id": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libQt5Pdf5-5.15.9-1.1.x86_64", "product": { "name": "libQt5Pdf5-5.15.9-1.1.x86_64", "product_id": "libQt5Pdf5-5.15.9-1.1.x86_64" } }, { "category": "product_version", "name": "libQt5PdfWidgets5-5.15.9-1.1.x86_64", "product": { "name": "libQt5PdfWidgets5-5.15.9-1.1.x86_64", "product_id": "libQt5PdfWidgets5-5.15.9-1.1.x86_64" } }, { "category": "product_version", "name": "libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "product": { "name": "libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "product_id": "libqt5-qtpdf-devel-5.15.9-1.1.x86_64" } }, { "category": "product_version", "name": "libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "product": { "name": "libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "product_id": "libqt5-qtpdf-examples-5.15.9-1.1.x86_64" } }, { "category": "product_version", "name": "libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "product": { "name": "libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "product_id": "libqt5-qtpdf-imports-5.15.9-1.1.x86_64" } }, { "category": "product_version", "name": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "product": { "name": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "product_id": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64" } }, { "category": "product_version", "name": "libqt5-qtwebengine-5.15.9-1.1.x86_64", "product": { "name": "libqt5-qtwebengine-5.15.9-1.1.x86_64", "product_id": "libqt5-qtwebengine-5.15.9-1.1.x86_64" } }, { "category": "product_version", "name": "libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "product": { "name": "libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "product_id": "libqt5-qtwebengine-devel-5.15.9-1.1.x86_64" } }, { "category": "product_version", "name": "libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "product": { "name": "libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "product_id": "libqt5-qtwebengine-examples-5.15.9-1.1.x86_64" } }, { "category": "product_version", "name": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64", "product": { "name": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64", "product_id": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libQt5Pdf5-5.15.9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64" }, "product_reference": "libQt5Pdf5-5.15.9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt5Pdf5-5.15.9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le" }, "product_reference": "libQt5Pdf5-5.15.9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt5Pdf5-5.15.9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x" }, "product_reference": "libQt5Pdf5-5.15.9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt5Pdf5-5.15.9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64" }, "product_reference": "libQt5Pdf5-5.15.9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt5PdfWidgets5-5.15.9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64" }, "product_reference": "libQt5PdfWidgets5-5.15.9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt5PdfWidgets5-5.15.9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le" }, "product_reference": "libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt5PdfWidgets5-5.15.9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x" }, "product_reference": "libQt5PdfWidgets5-5.15.9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt5PdfWidgets5-5.15.9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64" }, "product_reference": "libQt5PdfWidgets5-5.15.9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtpdf-devel-5.15.9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64" }, "product_reference": "libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtpdf-devel-5.15.9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le" }, "product_reference": "libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtpdf-devel-5.15.9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x" }, "product_reference": "libqt5-qtpdf-devel-5.15.9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtpdf-devel-5.15.9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64" }, "product_reference": "libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtpdf-examples-5.15.9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64" }, "product_reference": "libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtpdf-examples-5.15.9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le" }, "product_reference": "libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtpdf-examples-5.15.9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x" }, "product_reference": "libqt5-qtpdf-examples-5.15.9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtpdf-examples-5.15.9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64" }, "product_reference": "libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtpdf-imports-5.15.9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64" }, "product_reference": "libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtpdf-imports-5.15.9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le" }, "product_reference": "libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtpdf-imports-5.15.9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x" }, "product_reference": "libqt5-qtpdf-imports-5.15.9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtpdf-imports-5.15.9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64" }, "product_reference": "libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64" }, "product_reference": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le" }, "product_reference": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x" }, "product_reference": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64" }, "product_reference": "libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtwebengine-5.15.9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64" }, "product_reference": "libqt5-qtwebengine-5.15.9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtwebengine-5.15.9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le" }, "product_reference": "libqt5-qtwebengine-5.15.9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtwebengine-5.15.9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x" }, "product_reference": "libqt5-qtwebengine-5.15.9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtwebengine-5.15.9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64" }, "product_reference": "libqt5-qtwebengine-5.15.9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtwebengine-devel-5.15.9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64" }, "product_reference": "libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le" }, "product_reference": "libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtwebengine-devel-5.15.9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x" }, "product_reference": "libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtwebengine-devel-5.15.9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64" }, "product_reference": "libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtwebengine-examples-5.15.9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64" }, "product_reference": "libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le" }, "product_reference": "libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtwebengine-examples-5.15.9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x" }, "product_reference": "libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtwebengine-examples-5.15.9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64" }, "product_reference": "libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64" }, "product_reference": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le" }, "product_reference": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x" }, "product_reference": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" }, "product_reference": "libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0100", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0100" } ], "notes": [ { "category": "general", "text": "Heap buffer overflow in Media streams API in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0100", "url": "https://www.suse.com/security/cve/CVE-2022-0100" }, { "category": "external", "summary": "SUSE Bug 1194331 for CVE-2022-0100", "url": "https://bugzilla.suse.com/1194331" }, { "category": "external", "summary": "SUSE Bug 1213802 for CVE-2022-0100", "url": "https://bugzilla.suse.com/1213802" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0100" }, { "cve": "CVE-2022-0102", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0102" } ], "notes": [ { "category": "general", "text": "Type confusion in V8 in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0102", "url": "https://www.suse.com/security/cve/CVE-2022-0102" }, { "category": "external", "summary": "SUSE Bug 1194331 for CVE-2022-0102", "url": "https://bugzilla.suse.com/1194331" }, { "category": "external", "summary": "SUSE Bug 1213802 for CVE-2022-0102", "url": "https://bugzilla.suse.com/1213802" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0102" }, { "cve": "CVE-2022-0103", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0103" } ], "notes": [ { "category": "general", "text": "Use after free in SwiftShader in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0103", "url": "https://www.suse.com/security/cve/CVE-2022-0103" }, { "category": "external", "summary": "SUSE Bug 1194331 for CVE-2022-0103", "url": "https://bugzilla.suse.com/1194331" }, { "category": "external", "summary": "SUSE Bug 1213802 for CVE-2022-0103", "url": "https://bugzilla.suse.com/1213802" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0103" }, { "cve": "CVE-2022-0104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0104" } ], "notes": [ { "category": "general", "text": "Heap buffer overflow in ANGLE in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0104", "url": "https://www.suse.com/security/cve/CVE-2022-0104" }, { "category": "external", "summary": "SUSE Bug 1194331 for CVE-2022-0104", "url": "https://bugzilla.suse.com/1194331" }, { "category": "external", "summary": "SUSE Bug 1213802 for CVE-2022-0104", "url": "https://bugzilla.suse.com/1213802" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0104" }, { "cve": "CVE-2022-0108", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0108" } ], "notes": [ { "category": "general", "text": "Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0108", "url": "https://www.suse.com/security/cve/CVE-2022-0108" }, { "category": "external", "summary": "SUSE Bug 1194331 for CVE-2022-0108", "url": "https://bugzilla.suse.com/1194331" }, { "category": "external", "summary": "SUSE Bug 1210731 for CVE-2022-0108", "url": "https://bugzilla.suse.com/1210731" }, { "category": "external", "summary": "SUSE Bug 1213802 for CVE-2022-0108", "url": "https://bugzilla.suse.com/1213802" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0108" }, { "cve": "CVE-2022-0109", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0109" } ], "notes": [ { "category": "general", "text": "Inappropriate implementation in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0109", "url": "https://www.suse.com/security/cve/CVE-2022-0109" }, { "category": "external", "summary": "SUSE Bug 1194331 for CVE-2022-0109", "url": "https://bugzilla.suse.com/1194331" }, { "category": "external", "summary": "SUSE Bug 1213802 for CVE-2022-0109", "url": "https://bugzilla.suse.com/1213802" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0109" }, { "cve": "CVE-2022-0111", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0111" } ], "notes": [ { "category": "general", "text": "Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to incorrectly set origin via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0111", "url": "https://www.suse.com/security/cve/CVE-2022-0111" }, { "category": "external", "summary": "SUSE Bug 1194331 for CVE-2022-0111", "url": "https://bugzilla.suse.com/1194331" }, { "category": "external", "summary": "SUSE Bug 1213802 for CVE-2022-0111", "url": "https://bugzilla.suse.com/1213802" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0111" }, { "cve": "CVE-2022-0113", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0113" } ], "notes": [ { "category": "general", "text": "Inappropriate implementation in Blink in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0113", "url": "https://www.suse.com/security/cve/CVE-2022-0113" }, { "category": "external", "summary": "SUSE Bug 1194331 for CVE-2022-0113", "url": "https://bugzilla.suse.com/1194331" }, { "category": "external", "summary": "SUSE Bug 1213802 for CVE-2022-0113", "url": "https://bugzilla.suse.com/1213802" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0113" }, { "cve": "CVE-2022-0116", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0116" } ], "notes": [ { "category": "general", "text": "Inappropriate implementation in Compositing in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0116", "url": "https://www.suse.com/security/cve/CVE-2022-0116" }, { "category": "external", "summary": "SUSE Bug 1194331 for CVE-2022-0116", "url": "https://bugzilla.suse.com/1194331" }, { "category": "external", "summary": "SUSE Bug 1213802 for CVE-2022-0116", "url": "https://bugzilla.suse.com/1213802" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0116" }, { "cve": "CVE-2022-0289", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0289" } ], "notes": [ { "category": "general", "text": "Use after free in Safe browsing in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0289", "url": "https://www.suse.com/security/cve/CVE-2022-0289" }, { "category": "external", "summary": "SUSE Bug 1194919 for CVE-2022-0289", "url": "https://bugzilla.suse.com/1194919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0289" }, { "cve": "CVE-2022-0291", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0291" } ], "notes": [ { "category": "general", "text": "Inappropriate implementation in Storage in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0291", "url": "https://www.suse.com/security/cve/CVE-2022-0291" }, { "category": "external", "summary": "SUSE Bug 1194919 for CVE-2022-0291", "url": "https://bugzilla.suse.com/1194919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0291" }, { "cve": "CVE-2022-0293", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0293" } ], "notes": [ { "category": "general", "text": "Use after free in Web packaging in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0293", "url": "https://www.suse.com/security/cve/CVE-2022-0293" }, { "category": "external", "summary": "SUSE Bug 1194919 for CVE-2022-0293", "url": "https://bugzilla.suse.com/1194919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0293" }, { "cve": "CVE-2022-0298", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0298" } ], "notes": [ { "category": "general", "text": "Use after free in Scheduling in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0298", "url": "https://www.suse.com/security/cve/CVE-2022-0298" }, { "category": "external", "summary": "SUSE Bug 1194919 for CVE-2022-0298", "url": "https://bugzilla.suse.com/1194919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0298" }, { "cve": "CVE-2022-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0305" } ], "notes": [ { "category": "general", "text": "Inappropriate implementation in Service Worker API in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0305", "url": "https://www.suse.com/security/cve/CVE-2022-0305" }, { "category": "external", "summary": "SUSE Bug 1194919 for CVE-2022-0305", "url": "https://bugzilla.suse.com/1194919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0305" }, { "cve": "CVE-2022-0306", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0306" } ], "notes": [ { "category": "general", "text": "Heap buffer overflow in PDFium in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0306", "url": "https://www.suse.com/security/cve/CVE-2022-0306" }, { "category": "external", "summary": "SUSE Bug 1194919 for CVE-2022-0306", "url": "https://bugzilla.suse.com/1194919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0306" }, { "cve": "CVE-2022-0310", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0310" } ], "notes": [ { "category": "general", "text": "Heap buffer overflow in Task Manager in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via specific user interactions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0310", "url": "https://www.suse.com/security/cve/CVE-2022-0310" }, { "category": "external", "summary": "SUSE Bug 1194919 for CVE-2022-0310", "url": "https://bugzilla.suse.com/1194919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0310" }, { "cve": "CVE-2022-0456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0456" } ], "notes": [ { "category": "general", "text": "Use after free in Web Search in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via profile destruction.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0456", "url": "https://www.suse.com/security/cve/CVE-2022-0456" }, { "category": "external", "summary": "SUSE Bug 1195420 for CVE-2022-0456", "url": "https://bugzilla.suse.com/1195420" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0456" }, { "cve": "CVE-2022-0459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0459" } ], "notes": [ { "category": "general", "text": "Use after free in Screen Capture in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who had compromised the renderer process and convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0459", "url": "https://www.suse.com/security/cve/CVE-2022-0459" }, { "category": "external", "summary": "SUSE Bug 1195420 for CVE-2022-0459", "url": "https://bugzilla.suse.com/1195420" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0459" }, { "cve": "CVE-2022-0460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0460" } ], "notes": [ { "category": "general", "text": "Use after free in Window Dialogue in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0460", "url": "https://www.suse.com/security/cve/CVE-2022-0460" }, { "category": "external", "summary": "SUSE Bug 1195420 for CVE-2022-0460", "url": "https://bugzilla.suse.com/1195420" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0460" }, { "cve": "CVE-2022-0461", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0461" } ], "notes": [ { "category": "general", "text": "Policy bypass in COOP in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to bypass iframe sandbox via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0461", "url": "https://www.suse.com/security/cve/CVE-2022-0461" }, { "category": "external", "summary": "SUSE Bug 1195420 for CVE-2022-0461", "url": "https://bugzilla.suse.com/1195420" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2022-0461" }, { "cve": "CVE-2022-0606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0606" } ], "notes": [ { "category": "general", "text": "Use after free in ANGLE in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0606", "url": "https://www.suse.com/security/cve/CVE-2022-0606" }, { "category": "external", "summary": "SUSE Bug 1195986 for CVE-2022-0606", "url": "https://bugzilla.suse.com/1195986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0606" }, { "cve": "CVE-2022-0607", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0607" } ], "notes": [ { "category": "general", "text": "Use after free in GPU in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0607", "url": "https://www.suse.com/security/cve/CVE-2022-0607" }, { "category": "external", "summary": "SUSE Bug 1195986 for CVE-2022-0607", "url": "https://bugzilla.suse.com/1195986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0607" }, { "cve": "CVE-2022-0608", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0608" } ], "notes": [ { "category": "general", "text": "Integer overflow in Mojo in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0608", "url": "https://www.suse.com/security/cve/CVE-2022-0608" }, { "category": "external", "summary": "SUSE Bug 1195986 for CVE-2022-0608", "url": "https://bugzilla.suse.com/1195986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0608" }, { "cve": "CVE-2022-0609", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0609" } ], "notes": [ { "category": "general", "text": "Use after free in Animation in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0609", "url": "https://www.suse.com/security/cve/CVE-2022-0609" }, { "category": "external", "summary": "SUSE Bug 1195986 for CVE-2022-0609", "url": "https://bugzilla.suse.com/1195986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0609" }, { "cve": "CVE-2022-0610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0610" } ], "notes": [ { "category": "general", "text": "Inappropriate implementation in Gamepad API in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0610", "url": "https://www.suse.com/security/cve/CVE-2022-0610" }, { "category": "external", "summary": "SUSE Bug 1195986 for CVE-2022-0610", "url": "https://bugzilla.suse.com/1195986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0610" }, { "cve": "CVE-2022-23852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23852" } ], "notes": [ { "category": "general", "text": "Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23852", "url": "https://www.suse.com/security/cve/CVE-2022-23852" }, { "category": "external", "summary": "SUSE Bug 1195054 for CVE-2022-23852", "url": "https://bugzilla.suse.com/1195054" }, { "category": "external", "summary": "SUSE Bug 1196480 for CVE-2022-23852", "url": "https://bugzilla.suse.com/1196480" }, { "category": "external", "summary": "SUSE Bug 1200038 for CVE-2022-23852", "url": "https://bugzilla.suse.com/1200038" }, { "category": "external", "summary": "SUSE Bug 1200198 for CVE-2022-23852", "url": "https://bugzilla.suse.com/1200198" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5Pdf5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.9-1.1.x86_64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.aarch64", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.ppc64le", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.s390x", "openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23852" } ] }
opensuse-su-2024:12948-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
ungoogled-chromium-113.0.5672.92-1.1 on GA media
Notes
Title of the patch
ungoogled-chromium-113.0.5672.92-1.1 on GA media
Description of the patch
These are all security issues fixed in the ungoogled-chromium-113.0.5672.92-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-12948
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ungoogled-chromium-113.0.5672.92-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ungoogled-chromium-113.0.5672.92-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-12948", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12948-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3015 page", "url": "https://www.suse.com/security/cve/CVE-2011-3015/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3016 page", "url": "https://www.suse.com/security/cve/CVE-2011-3016/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3017 page", "url": "https://www.suse.com/security/cve/CVE-2011-3017/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3018 page", "url": "https://www.suse.com/security/cve/CVE-2011-3018/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3019 page", "url": "https://www.suse.com/security/cve/CVE-2011-3019/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3020 page", "url": "https://www.suse.com/security/cve/CVE-2011-3020/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3021 page", "url": "https://www.suse.com/security/cve/CVE-2011-3021/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3022 page", "url": "https://www.suse.com/security/cve/CVE-2011-3022/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3023 page", "url": "https://www.suse.com/security/cve/CVE-2011-3023/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3024 page", "url": "https://www.suse.com/security/cve/CVE-2011-3024/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3025 page", "url": "https://www.suse.com/security/cve/CVE-2011-3025/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3026 page", "url": "https://www.suse.com/security/cve/CVE-2011-3026/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3027 page", "url": "https://www.suse.com/security/cve/CVE-2011-3027/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3031 page", "url": "https://www.suse.com/security/cve/CVE-2011-3031/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3032 page", "url": "https://www.suse.com/security/cve/CVE-2011-3032/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3033 page", "url": "https://www.suse.com/security/cve/CVE-2011-3033/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3034 page", "url": "https://www.suse.com/security/cve/CVE-2011-3034/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3035 page", "url": "https://www.suse.com/security/cve/CVE-2011-3035/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3036 page", "url": "https://www.suse.com/security/cve/CVE-2011-3036/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3037 page", "url": "https://www.suse.com/security/cve/CVE-2011-3037/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3038 page", "url": "https://www.suse.com/security/cve/CVE-2011-3038/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3039 page", "url": "https://www.suse.com/security/cve/CVE-2011-3039/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3040 page", "url": "https://www.suse.com/security/cve/CVE-2011-3040/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3041 page", "url": "https://www.suse.com/security/cve/CVE-2011-3041/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3042 page", "url": "https://www.suse.com/security/cve/CVE-2011-3042/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3043 page", "url": "https://www.suse.com/security/cve/CVE-2011-3043/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3044 page", "url": "https://www.suse.com/security/cve/CVE-2011-3044/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3045 page", "url": "https://www.suse.com/security/cve/CVE-2011-3045/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3046 page", "url": "https://www.suse.com/security/cve/CVE-2011-3046/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3047 page", "url": "https://www.suse.com/security/cve/CVE-2011-3047/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3049 page", "url": "https://www.suse.com/security/cve/CVE-2011-3049/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3050 page", "url": "https://www.suse.com/security/cve/CVE-2011-3050/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3051 page", "url": "https://www.suse.com/security/cve/CVE-2011-3051/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3052 page", "url": "https://www.suse.com/security/cve/CVE-2011-3052/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3053 page", "url": "https://www.suse.com/security/cve/CVE-2011-3053/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3054 page", "url": "https://www.suse.com/security/cve/CVE-2011-3054/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3055 page", "url": "https://www.suse.com/security/cve/CVE-2011-3055/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3056 page", "url": "https://www.suse.com/security/cve/CVE-2011-3056/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3057 page", "url": "https://www.suse.com/security/cve/CVE-2011-3057/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3058 page", "url": "https://www.suse.com/security/cve/CVE-2011-3058/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3059 page", "url": "https://www.suse.com/security/cve/CVE-2011-3059/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3060 page", "url": "https://www.suse.com/security/cve/CVE-2011-3060/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3061 page", "url": "https://www.suse.com/security/cve/CVE-2011-3061/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3062 page", "url": "https://www.suse.com/security/cve/CVE-2011-3062/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3063 page", "url": "https://www.suse.com/security/cve/CVE-2011-3063/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3064 page", "url": "https://www.suse.com/security/cve/CVE-2011-3064/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3065 page", "url": "https://www.suse.com/security/cve/CVE-2011-3065/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3066 page", "url": "https://www.suse.com/security/cve/CVE-2011-3066/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3067 page", "url": "https://www.suse.com/security/cve/CVE-2011-3067/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3068 page", "url": "https://www.suse.com/security/cve/CVE-2011-3068/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3069 page", "url": "https://www.suse.com/security/cve/CVE-2011-3069/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3070 page", "url": "https://www.suse.com/security/cve/CVE-2011-3070/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3071 page", "url": "https://www.suse.com/security/cve/CVE-2011-3071/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3072 page", "url": "https://www.suse.com/security/cve/CVE-2011-3072/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3073 page", "url": "https://www.suse.com/security/cve/CVE-2011-3073/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3074 page", "url": "https://www.suse.com/security/cve/CVE-2011-3074/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3075 page", "url": "https://www.suse.com/security/cve/CVE-2011-3075/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3076 page", "url": "https://www.suse.com/security/cve/CVE-2011-3076/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3077 page", "url": "https://www.suse.com/security/cve/CVE-2011-3077/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3078 page", "url": "https://www.suse.com/security/cve/CVE-2011-3078/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3079 page", "url": "https://www.suse.com/security/cve/CVE-2011-3079/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3080 page", "url": "https://www.suse.com/security/cve/CVE-2011-3080/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3081 page", "url": "https://www.suse.com/security/cve/CVE-2011-3081/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3083 page", "url": "https://www.suse.com/security/cve/CVE-2011-3083/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3084 page", "url": "https://www.suse.com/security/cve/CVE-2011-3084/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3085 page", "url": "https://www.suse.com/security/cve/CVE-2011-3085/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3086 page", "url": "https://www.suse.com/security/cve/CVE-2011-3086/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3087 page", "url": "https://www.suse.com/security/cve/CVE-2011-3087/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3088 page", "url": "https://www.suse.com/security/cve/CVE-2011-3088/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3089 page", "url": "https://www.suse.com/security/cve/CVE-2011-3089/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3090 page", "url": "https://www.suse.com/security/cve/CVE-2011-3090/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3091 page", "url": "https://www.suse.com/security/cve/CVE-2011-3091/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3092 page", "url": "https://www.suse.com/security/cve/CVE-2011-3092/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3093 page", "url": "https://www.suse.com/security/cve/CVE-2011-3093/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3094 page", "url": "https://www.suse.com/security/cve/CVE-2011-3094/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3095 page", "url": "https://www.suse.com/security/cve/CVE-2011-3095/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3096 page", "url": "https://www.suse.com/security/cve/CVE-2011-3096/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3098 page", "url": "https://www.suse.com/security/cve/CVE-2011-3098/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3100 page", "url": "https://www.suse.com/security/cve/CVE-2011-3100/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3101 page", "url": "https://www.suse.com/security/cve/CVE-2011-3101/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3102 page", "url": "https://www.suse.com/security/cve/CVE-2011-3102/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3903 page", "url": "https://www.suse.com/security/cve/CVE-2011-3903/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3904 page", "url": "https://www.suse.com/security/cve/CVE-2011-3904/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3905 page", "url": "https://www.suse.com/security/cve/CVE-2011-3905/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3906 page", "url": "https://www.suse.com/security/cve/CVE-2011-3906/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3907 page", "url": "https://www.suse.com/security/cve/CVE-2011-3907/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3908 page", "url": "https://www.suse.com/security/cve/CVE-2011-3908/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3909 page", "url": "https://www.suse.com/security/cve/CVE-2011-3909/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3910 page", "url": "https://www.suse.com/security/cve/CVE-2011-3910/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3911 page", "url": "https://www.suse.com/security/cve/CVE-2011-3911/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3912 page", "url": "https://www.suse.com/security/cve/CVE-2011-3912/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3914 page", "url": "https://www.suse.com/security/cve/CVE-2011-3914/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3915 page", "url": "https://www.suse.com/security/cve/CVE-2011-3915/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3916 page", "url": "https://www.suse.com/security/cve/CVE-2011-3916/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3917 page", "url": "https://www.suse.com/security/cve/CVE-2011-3917/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3919 page", "url": "https://www.suse.com/security/cve/CVE-2011-3919/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3921 page", "url": "https://www.suse.com/security/cve/CVE-2011-3921/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3922 page", "url": "https://www.suse.com/security/cve/CVE-2011-3922/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3924 page", "url": "https://www.suse.com/security/cve/CVE-2011-3924/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3925 page", "url": "https://www.suse.com/security/cve/CVE-2011-3925/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3926 page", "url": "https://www.suse.com/security/cve/CVE-2011-3926/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3927 page", "url": "https://www.suse.com/security/cve/CVE-2011-3927/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3928 page", "url": "https://www.suse.com/security/cve/CVE-2011-3928/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3953 page", "url": "https://www.suse.com/security/cve/CVE-2011-3953/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3954 page", "url": "https://www.suse.com/security/cve/CVE-2011-3954/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3955 page", "url": "https://www.suse.com/security/cve/CVE-2011-3955/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3956 page", "url": "https://www.suse.com/security/cve/CVE-2011-3956/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3957 page", "url": "https://www.suse.com/security/cve/CVE-2011-3957/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3958 page", "url": "https://www.suse.com/security/cve/CVE-2011-3958/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3959 page", "url": "https://www.suse.com/security/cve/CVE-2011-3959/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3960 page", "url": "https://www.suse.com/security/cve/CVE-2011-3960/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3961 page", "url": "https://www.suse.com/security/cve/CVE-2011-3961/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3962 page", "url": "https://www.suse.com/security/cve/CVE-2011-3962/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3963 page", "url": "https://www.suse.com/security/cve/CVE-2011-3963/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3964 page", "url": "https://www.suse.com/security/cve/CVE-2011-3964/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3965 page", "url": "https://www.suse.com/security/cve/CVE-2011-3965/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3966 page", "url": "https://www.suse.com/security/cve/CVE-2011-3966/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3967 page", "url": "https://www.suse.com/security/cve/CVE-2011-3967/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3968 page", "url": "https://www.suse.com/security/cve/CVE-2011-3968/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3969 page", "url": "https://www.suse.com/security/cve/CVE-2011-3969/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3970 page", "url": "https://www.suse.com/security/cve/CVE-2011-3970/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3971 page", "url": "https://www.suse.com/security/cve/CVE-2011-3971/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3972 page", "url": "https://www.suse.com/security/cve/CVE-2011-3972/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1521 page", "url": "https://www.suse.com/security/cve/CVE-2012-1521/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2807 page", "url": "https://www.suse.com/security/cve/CVE-2012-2807/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2815 page", "url": "https://www.suse.com/security/cve/CVE-2012-2815/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2816 page", "url": "https://www.suse.com/security/cve/CVE-2012-2816/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2817 page", "url": "https://www.suse.com/security/cve/CVE-2012-2817/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2818 page", "url": "https://www.suse.com/security/cve/CVE-2012-2818/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2819 page", "url": "https://www.suse.com/security/cve/CVE-2012-2819/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2820 page", "url": "https://www.suse.com/security/cve/CVE-2012-2820/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2821 page", "url": "https://www.suse.com/security/cve/CVE-2012-2821/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2823 page", "url": "https://www.suse.com/security/cve/CVE-2012-2823/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2825 page", "url": "https://www.suse.com/security/cve/CVE-2012-2825/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2826 page", "url": "https://www.suse.com/security/cve/CVE-2012-2826/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2829 page", "url": "https://www.suse.com/security/cve/CVE-2012-2829/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2830 page", "url": "https://www.suse.com/security/cve/CVE-2012-2830/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2831 page", "url": "https://www.suse.com/security/cve/CVE-2012-2831/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2834 page", "url": "https://www.suse.com/security/cve/CVE-2012-2834/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2842 page", "url": "https://www.suse.com/security/cve/CVE-2012-2842/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2843 page", "url": "https://www.suse.com/security/cve/CVE-2012-2843/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2865 page", "url": "https://www.suse.com/security/cve/CVE-2012-2865/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2866 page", "url": "https://www.suse.com/security/cve/CVE-2012-2866/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2867 page", "url": "https://www.suse.com/security/cve/CVE-2012-2867/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2868 page", "url": "https://www.suse.com/security/cve/CVE-2012-2868/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2869 page", "url": "https://www.suse.com/security/cve/CVE-2012-2869/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2870 page", "url": "https://www.suse.com/security/cve/CVE-2012-2870/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2871 page", "url": "https://www.suse.com/security/cve/CVE-2012-2871/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2872 page", "url": "https://www.suse.com/security/cve/CVE-2012-2872/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2874 page", "url": "https://www.suse.com/security/cve/CVE-2012-2874/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2876 page", "url": "https://www.suse.com/security/cve/CVE-2012-2876/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2877 page", "url": "https://www.suse.com/security/cve/CVE-2012-2877/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2878 page", "url": "https://www.suse.com/security/cve/CVE-2012-2878/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2879 page", "url": "https://www.suse.com/security/cve/CVE-2012-2879/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2880 page", "url": "https://www.suse.com/security/cve/CVE-2012-2880/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2881 page", "url": "https://www.suse.com/security/cve/CVE-2012-2881/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2882 page", "url": "https://www.suse.com/security/cve/CVE-2012-2882/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2883 page", "url": "https://www.suse.com/security/cve/CVE-2012-2883/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2884 page", "url": "https://www.suse.com/security/cve/CVE-2012-2884/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2885 page", "url": "https://www.suse.com/security/cve/CVE-2012-2885/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2886 page", "url": "https://www.suse.com/security/cve/CVE-2012-2886/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2887 page", "url": "https://www.suse.com/security/cve/CVE-2012-2887/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2888 page", "url": "https://www.suse.com/security/cve/CVE-2012-2888/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2889 page", "url": "https://www.suse.com/security/cve/CVE-2012-2889/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2891 page", "url": "https://www.suse.com/security/cve/CVE-2012-2891/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2892 page", "url": "https://www.suse.com/security/cve/CVE-2012-2892/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2893 page", "url": "https://www.suse.com/security/cve/CVE-2012-2893/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2894 page", "url": "https://www.suse.com/security/cve/CVE-2012-2894/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2896 page", "url": "https://www.suse.com/security/cve/CVE-2012-2896/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5130 page", "url": "https://www.suse.com/security/cve/CVE-2012-5130/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5131 page", "url": "https://www.suse.com/security/cve/CVE-2012-5131/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5132 page", "url": "https://www.suse.com/security/cve/CVE-2012-5132/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5133 page", "url": "https://www.suse.com/security/cve/CVE-2012-5133/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5134 page", "url": "https://www.suse.com/security/cve/CVE-2012-5134/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5135 page", "url": "https://www.suse.com/security/cve/CVE-2012-5135/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5136 page", "url": "https://www.suse.com/security/cve/CVE-2012-5136/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5137 page", "url": "https://www.suse.com/security/cve/CVE-2012-5137/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5138 page", "url": "https://www.suse.com/security/cve/CVE-2012-5138/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5139 page", "url": "https://www.suse.com/security/cve/CVE-2012-5139/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5140 page", "url": "https://www.suse.com/security/cve/CVE-2012-5140/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5141 page", "url": "https://www.suse.com/security/cve/CVE-2012-5141/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5142 page", "url": "https://www.suse.com/security/cve/CVE-2012-5142/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5143 page", "url": "https://www.suse.com/security/cve/CVE-2012-5143/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5144 page", "url": "https://www.suse.com/security/cve/CVE-2012-5144/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5145 page", "url": "https://www.suse.com/security/cve/CVE-2012-5145/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5146 page", "url": "https://www.suse.com/security/cve/CVE-2012-5146/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5147 page", "url": "https://www.suse.com/security/cve/CVE-2012-5147/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5148 page", "url": "https://www.suse.com/security/cve/CVE-2012-5148/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5149 page", "url": "https://www.suse.com/security/cve/CVE-2012-5149/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5150 page", "url": "https://www.suse.com/security/cve/CVE-2012-5150/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5152 page", "url": "https://www.suse.com/security/cve/CVE-2012-5152/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5153 page", "url": "https://www.suse.com/security/cve/CVE-2012-5153/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5154 page", "url": "https://www.suse.com/security/cve/CVE-2012-5154/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0830 page", "url": "https://www.suse.com/security/cve/CVE-2013-0830/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0831 page", "url": "https://www.suse.com/security/cve/CVE-2013-0831/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0832 page", "url": "https://www.suse.com/security/cve/CVE-2013-0832/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0833 page", "url": "https://www.suse.com/security/cve/CVE-2013-0833/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0834 page", "url": "https://www.suse.com/security/cve/CVE-2013-0834/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0835 page", "url": "https://www.suse.com/security/cve/CVE-2013-0835/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0836 page", "url": "https://www.suse.com/security/cve/CVE-2013-0836/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0837 page", "url": "https://www.suse.com/security/cve/CVE-2013-0837/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0838 page", "url": "https://www.suse.com/security/cve/CVE-2013-0838/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0879 page", "url": "https://www.suse.com/security/cve/CVE-2013-0879/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0880 page", "url": "https://www.suse.com/security/cve/CVE-2013-0880/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0881 page", "url": "https://www.suse.com/security/cve/CVE-2013-0881/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0882 page", "url": "https://www.suse.com/security/cve/CVE-2013-0882/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0883 page", "url": "https://www.suse.com/security/cve/CVE-2013-0883/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0884 page", "url": "https://www.suse.com/security/cve/CVE-2013-0884/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0885 page", "url": "https://www.suse.com/security/cve/CVE-2013-0885/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0886 page", "url": "https://www.suse.com/security/cve/CVE-2013-0886/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0887 page", "url": "https://www.suse.com/security/cve/CVE-2013-0887/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0888 page", "url": "https://www.suse.com/security/cve/CVE-2013-0888/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0889 page", "url": "https://www.suse.com/security/cve/CVE-2013-0889/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0890 page", "url": "https://www.suse.com/security/cve/CVE-2013-0890/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0891 page", "url": "https://www.suse.com/security/cve/CVE-2013-0891/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0892 page", "url": "https://www.suse.com/security/cve/CVE-2013-0892/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0893 page", "url": "https://www.suse.com/security/cve/CVE-2013-0893/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0894 page", "url": "https://www.suse.com/security/cve/CVE-2013-0894/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0895 page", "url": "https://www.suse.com/security/cve/CVE-2013-0895/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0896 page", "url": "https://www.suse.com/security/cve/CVE-2013-0896/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0897 page", "url": "https://www.suse.com/security/cve/CVE-2013-0897/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0898 page", "url": "https://www.suse.com/security/cve/CVE-2013-0898/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0899 page", "url": "https://www.suse.com/security/cve/CVE-2013-0899/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0900 page", "url": "https://www.suse.com/security/cve/CVE-2013-0900/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2838 page", "url": "https://www.suse.com/security/cve/CVE-2013-2838/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2906 page", "url": "https://www.suse.com/security/cve/CVE-2013-2906/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2907 page", "url": "https://www.suse.com/security/cve/CVE-2013-2907/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2908 page", "url": "https://www.suse.com/security/cve/CVE-2013-2908/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2909 page", "url": "https://www.suse.com/security/cve/CVE-2013-2909/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2910 page", "url": "https://www.suse.com/security/cve/CVE-2013-2910/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2911 page", "url": "https://www.suse.com/security/cve/CVE-2013-2911/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2912 page", "url": "https://www.suse.com/security/cve/CVE-2013-2912/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2913 page", "url": "https://www.suse.com/security/cve/CVE-2013-2913/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2914 page", "url": "https://www.suse.com/security/cve/CVE-2013-2914/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2915 page", "url": "https://www.suse.com/security/cve/CVE-2013-2915/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2916 page", "url": "https://www.suse.com/security/cve/CVE-2013-2916/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2917 page", "url": "https://www.suse.com/security/cve/CVE-2013-2917/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2918 page", "url": "https://www.suse.com/security/cve/CVE-2013-2918/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2919 page", "url": "https://www.suse.com/security/cve/CVE-2013-2919/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2920 page", "url": "https://www.suse.com/security/cve/CVE-2013-2920/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2921 page", "url": "https://www.suse.com/security/cve/CVE-2013-2921/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2922 page", "url": "https://www.suse.com/security/cve/CVE-2013-2922/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2923 page", "url": "https://www.suse.com/security/cve/CVE-2013-2923/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2924 page", "url": "https://www.suse.com/security/cve/CVE-2013-2924/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2925 page", "url": "https://www.suse.com/security/cve/CVE-2013-2925/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2926 page", "url": "https://www.suse.com/security/cve/CVE-2013-2926/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2927 page", "url": "https://www.suse.com/security/cve/CVE-2013-2927/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2928 page", "url": "https://www.suse.com/security/cve/CVE-2013-2928/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2931 page", "url": "https://www.suse.com/security/cve/CVE-2013-2931/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6621 page", "url": "https://www.suse.com/security/cve/CVE-2013-6621/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6622 page", "url": "https://www.suse.com/security/cve/CVE-2013-6622/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6623 page", "url": "https://www.suse.com/security/cve/CVE-2013-6623/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6624 page", "url": "https://www.suse.com/security/cve/CVE-2013-6624/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6625 page", "url": "https://www.suse.com/security/cve/CVE-2013-6625/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6626 page", "url": "https://www.suse.com/security/cve/CVE-2013-6626/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6627 page", "url": "https://www.suse.com/security/cve/CVE-2013-6627/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6628 page", "url": "https://www.suse.com/security/cve/CVE-2013-6628/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6629 page", "url": "https://www.suse.com/security/cve/CVE-2013-6629/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6630 page", "url": "https://www.suse.com/security/cve/CVE-2013-6630/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6631 page", "url": "https://www.suse.com/security/cve/CVE-2013-6631/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6632 page", "url": "https://www.suse.com/security/cve/CVE-2013-6632/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6634 page", "url": "https://www.suse.com/security/cve/CVE-2013-6634/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6635 page", "url": "https://www.suse.com/security/cve/CVE-2013-6635/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6636 page", "url": "https://www.suse.com/security/cve/CVE-2013-6636/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6637 page", "url": "https://www.suse.com/security/cve/CVE-2013-6637/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6638 page", "url": "https://www.suse.com/security/cve/CVE-2013-6638/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6639 page", "url": "https://www.suse.com/security/cve/CVE-2013-6639/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6640 page", "url": "https://www.suse.com/security/cve/CVE-2013-6640/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6641 page", "url": "https://www.suse.com/security/cve/CVE-2013-6641/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6643 page", "url": "https://www.suse.com/security/cve/CVE-2013-6643/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6644 page", "url": "https://www.suse.com/security/cve/CVE-2013-6644/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6645 page", "url": "https://www.suse.com/security/cve/CVE-2013-6645/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6646 page", "url": "https://www.suse.com/security/cve/CVE-2013-6646/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6649 page", "url": "https://www.suse.com/security/cve/CVE-2013-6649/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6650 page", "url": "https://www.suse.com/security/cve/CVE-2013-6650/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6653 page", "url": "https://www.suse.com/security/cve/CVE-2013-6653/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6654 page", "url": "https://www.suse.com/security/cve/CVE-2013-6654/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6655 page", "url": "https://www.suse.com/security/cve/CVE-2013-6655/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6656 page", "url": "https://www.suse.com/security/cve/CVE-2013-6656/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6657 page", "url": "https://www.suse.com/security/cve/CVE-2013-6657/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6658 page", "url": "https://www.suse.com/security/cve/CVE-2013-6658/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6659 page", "url": "https://www.suse.com/security/cve/CVE-2013-6659/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6660 page", "url": "https://www.suse.com/security/cve/CVE-2013-6660/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6661 page", "url": "https://www.suse.com/security/cve/CVE-2013-6661/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0574 page", "url": "https://www.suse.com/security/cve/CVE-2014-0574/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1700 page", "url": "https://www.suse.com/security/cve/CVE-2014-1700/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1701 page", "url": "https://www.suse.com/security/cve/CVE-2014-1701/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1702 page", "url": "https://www.suse.com/security/cve/CVE-2014-1702/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1703 page", "url": "https://www.suse.com/security/cve/CVE-2014-1703/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1704 page", "url": "https://www.suse.com/security/cve/CVE-2014-1704/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1705 page", "url": "https://www.suse.com/security/cve/CVE-2014-1705/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1713 page", "url": "https://www.suse.com/security/cve/CVE-2014-1713/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1714 page", "url": "https://www.suse.com/security/cve/CVE-2014-1714/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1715 page", "url": "https://www.suse.com/security/cve/CVE-2014-1715/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1716 page", "url": "https://www.suse.com/security/cve/CVE-2014-1716/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1717 page", "url": "https://www.suse.com/security/cve/CVE-2014-1717/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1718 page", "url": "https://www.suse.com/security/cve/CVE-2014-1718/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1719 page", "url": "https://www.suse.com/security/cve/CVE-2014-1719/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1720 page", "url": "https://www.suse.com/security/cve/CVE-2014-1720/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1721 page", "url": "https://www.suse.com/security/cve/CVE-2014-1721/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1722 page", "url": "https://www.suse.com/security/cve/CVE-2014-1722/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1723 page", "url": "https://www.suse.com/security/cve/CVE-2014-1723/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1724 page", "url": "https://www.suse.com/security/cve/CVE-2014-1724/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1725 page", "url": "https://www.suse.com/security/cve/CVE-2014-1725/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1726 page", "url": "https://www.suse.com/security/cve/CVE-2014-1726/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1727 page", "url": "https://www.suse.com/security/cve/CVE-2014-1727/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1728 page", "url": "https://www.suse.com/security/cve/CVE-2014-1728/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1729 page", "url": "https://www.suse.com/security/cve/CVE-2014-1729/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1730 page", "url": "https://www.suse.com/security/cve/CVE-2014-1730/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1731 page", "url": "https://www.suse.com/security/cve/CVE-2014-1731/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1732 page", "url": "https://www.suse.com/security/cve/CVE-2014-1732/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1733 page", "url": "https://www.suse.com/security/cve/CVE-2014-1733/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1734 page", "url": "https://www.suse.com/security/cve/CVE-2014-1734/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1735 page", "url": "https://www.suse.com/security/cve/CVE-2014-1735/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1740 page", "url": "https://www.suse.com/security/cve/CVE-2014-1740/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1741 page", "url": "https://www.suse.com/security/cve/CVE-2014-1741/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1742 page", "url": "https://www.suse.com/security/cve/CVE-2014-1742/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1743 page", "url": "https://www.suse.com/security/cve/CVE-2014-1743/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1744 page", "url": "https://www.suse.com/security/cve/CVE-2014-1744/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1745 page", "url": "https://www.suse.com/security/cve/CVE-2014-1745/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1746 page", "url": "https://www.suse.com/security/cve/CVE-2014-1746/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1747 page", "url": "https://www.suse.com/security/cve/CVE-2014-1747/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1748 page", "url": "https://www.suse.com/security/cve/CVE-2014-1748/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1749 page", "url": "https://www.suse.com/security/cve/CVE-2014-1749/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3152 page", "url": "https://www.suse.com/security/cve/CVE-2014-3152/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3154 page", "url": "https://www.suse.com/security/cve/CVE-2014-3154/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3155 page", "url": "https://www.suse.com/security/cve/CVE-2014-3155/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3156 page", "url": "https://www.suse.com/security/cve/CVE-2014-3156/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3157 page", "url": "https://www.suse.com/security/cve/CVE-2014-3157/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3160 page", "url": "https://www.suse.com/security/cve/CVE-2014-3160/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3162 page", "url": "https://www.suse.com/security/cve/CVE-2014-3162/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3165 page", "url": "https://www.suse.com/security/cve/CVE-2014-3165/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3166 page", "url": "https://www.suse.com/security/cve/CVE-2014-3166/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3167 page", "url": "https://www.suse.com/security/cve/CVE-2014-3167/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3168 page", "url": "https://www.suse.com/security/cve/CVE-2014-3168/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3169 page", "url": "https://www.suse.com/security/cve/CVE-2014-3169/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3170 page", "url": "https://www.suse.com/security/cve/CVE-2014-3170/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3171 page", "url": "https://www.suse.com/security/cve/CVE-2014-3171/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3172 page", "url": "https://www.suse.com/security/cve/CVE-2014-3172/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3173 page", "url": "https://www.suse.com/security/cve/CVE-2014-3173/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3174 page", "url": "https://www.suse.com/security/cve/CVE-2014-3174/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3175 page", "url": "https://www.suse.com/security/cve/CVE-2014-3175/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3176 page", "url": "https://www.suse.com/security/cve/CVE-2014-3176/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3178 page", "url": "https://www.suse.com/security/cve/CVE-2014-3178/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3188 page", "url": "https://www.suse.com/security/cve/CVE-2014-3188/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3189 page", "url": "https://www.suse.com/security/cve/CVE-2014-3189/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3190 page", "url": "https://www.suse.com/security/cve/CVE-2014-3190/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3191 page", "url": "https://www.suse.com/security/cve/CVE-2014-3191/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3192 page", "url": "https://www.suse.com/security/cve/CVE-2014-3192/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3193 page", "url": "https://www.suse.com/security/cve/CVE-2014-3193/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3194 page", "url": "https://www.suse.com/security/cve/CVE-2014-3194/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3195 page", "url": "https://www.suse.com/security/cve/CVE-2014-3195/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3196 page", "url": "https://www.suse.com/security/cve/CVE-2014-3196/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3197 page", "url": "https://www.suse.com/security/cve/CVE-2014-3197/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3198 page", "url": "https://www.suse.com/security/cve/CVE-2014-3198/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3199 page", "url": "https://www.suse.com/security/cve/CVE-2014-3199/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3200 page", "url": "https://www.suse.com/security/cve/CVE-2014-3200/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7899 page", "url": "https://www.suse.com/security/cve/CVE-2014-7899/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7900 page", "url": "https://www.suse.com/security/cve/CVE-2014-7900/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7901 page", "url": "https://www.suse.com/security/cve/CVE-2014-7901/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7902 page", "url": "https://www.suse.com/security/cve/CVE-2014-7902/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7903 page", "url": "https://www.suse.com/security/cve/CVE-2014-7903/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7904 page", "url": "https://www.suse.com/security/cve/CVE-2014-7904/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7905 page", "url": "https://www.suse.com/security/cve/CVE-2014-7905/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7906 page", "url": "https://www.suse.com/security/cve/CVE-2014-7906/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7907 page", "url": "https://www.suse.com/security/cve/CVE-2014-7907/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7908 page", "url": "https://www.suse.com/security/cve/CVE-2014-7908/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7909 page", "url": "https://www.suse.com/security/cve/CVE-2014-7909/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7910 page", "url": "https://www.suse.com/security/cve/CVE-2014-7910/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7923 page", "url": "https://www.suse.com/security/cve/CVE-2014-7923/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7924 page", "url": "https://www.suse.com/security/cve/CVE-2014-7924/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7925 page", "url": "https://www.suse.com/security/cve/CVE-2014-7925/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7926 page", "url": "https://www.suse.com/security/cve/CVE-2014-7926/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7927 page", "url": "https://www.suse.com/security/cve/CVE-2014-7927/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7928 page", "url": "https://www.suse.com/security/cve/CVE-2014-7928/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7929 page", "url": "https://www.suse.com/security/cve/CVE-2014-7929/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7930 page", "url": "https://www.suse.com/security/cve/CVE-2014-7930/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7932 page", "url": "https://www.suse.com/security/cve/CVE-2014-7932/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7933 page", "url": "https://www.suse.com/security/cve/CVE-2014-7933/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7934 page", "url": "https://www.suse.com/security/cve/CVE-2014-7934/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7935 page", "url": "https://www.suse.com/security/cve/CVE-2014-7935/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7936 page", "url": "https://www.suse.com/security/cve/CVE-2014-7936/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7937 page", "url": "https://www.suse.com/security/cve/CVE-2014-7937/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7938 page", "url": "https://www.suse.com/security/cve/CVE-2014-7938/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7939 page", "url": "https://www.suse.com/security/cve/CVE-2014-7939/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7940 page", "url": "https://www.suse.com/security/cve/CVE-2014-7940/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7941 page", "url": "https://www.suse.com/security/cve/CVE-2014-7941/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7942 page", "url": "https://www.suse.com/security/cve/CVE-2014-7942/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7943 page", "url": "https://www.suse.com/security/cve/CVE-2014-7943/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7944 page", "url": "https://www.suse.com/security/cve/CVE-2014-7944/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7945 page", "url": "https://www.suse.com/security/cve/CVE-2014-7945/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7946 page", "url": "https://www.suse.com/security/cve/CVE-2014-7946/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7947 page", "url": "https://www.suse.com/security/cve/CVE-2014-7947/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7948 page", "url": "https://www.suse.com/security/cve/CVE-2014-7948/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1205 page", "url": "https://www.suse.com/security/cve/CVE-2015-1205/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1209 page", "url": "https://www.suse.com/security/cve/CVE-2015-1209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1210 page", "url": "https://www.suse.com/security/cve/CVE-2015-1210/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1211 page", "url": "https://www.suse.com/security/cve/CVE-2015-1211/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1212 page", "url": "https://www.suse.com/security/cve/CVE-2015-1212/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1213 page", "url": "https://www.suse.com/security/cve/CVE-2015-1213/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1214 page", "url": "https://www.suse.com/security/cve/CVE-2015-1214/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1215 page", "url": "https://www.suse.com/security/cve/CVE-2015-1215/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1216 page", "url": "https://www.suse.com/security/cve/CVE-2015-1216/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1217 page", "url": "https://www.suse.com/security/cve/CVE-2015-1217/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1218 page", "url": "https://www.suse.com/security/cve/CVE-2015-1218/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1219 page", "url": "https://www.suse.com/security/cve/CVE-2015-1219/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1220 page", "url": "https://www.suse.com/security/cve/CVE-2015-1220/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1221 page", "url": "https://www.suse.com/security/cve/CVE-2015-1221/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1222 page", "url": "https://www.suse.com/security/cve/CVE-2015-1222/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1223 page", "url": "https://www.suse.com/security/cve/CVE-2015-1223/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1224 page", "url": "https://www.suse.com/security/cve/CVE-2015-1224/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1225 page", "url": "https://www.suse.com/security/cve/CVE-2015-1225/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1226 page", "url": "https://www.suse.com/security/cve/CVE-2015-1226/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1227 page", "url": "https://www.suse.com/security/cve/CVE-2015-1227/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1228 page", "url": "https://www.suse.com/security/cve/CVE-2015-1228/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1229 page", "url": "https://www.suse.com/security/cve/CVE-2015-1229/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1230 page", "url": "https://www.suse.com/security/cve/CVE-2015-1230/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1231 page", "url": "https://www.suse.com/security/cve/CVE-2015-1231/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1233 page", "url": "https://www.suse.com/security/cve/CVE-2015-1233/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1234 page", "url": "https://www.suse.com/security/cve/CVE-2015-1234/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1235 page", "url": "https://www.suse.com/security/cve/CVE-2015-1235/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1236 page", "url": "https://www.suse.com/security/cve/CVE-2015-1236/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1237 page", "url": "https://www.suse.com/security/cve/CVE-2015-1237/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1238 page", "url": "https://www.suse.com/security/cve/CVE-2015-1238/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1240 page", "url": "https://www.suse.com/security/cve/CVE-2015-1240/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1241 page", "url": "https://www.suse.com/security/cve/CVE-2015-1241/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1242 page", "url": "https://www.suse.com/security/cve/CVE-2015-1242/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1243 page", "url": "https://www.suse.com/security/cve/CVE-2015-1243/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1244 page", "url": "https://www.suse.com/security/cve/CVE-2015-1244/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1245 page", "url": "https://www.suse.com/security/cve/CVE-2015-1245/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1246 page", "url": "https://www.suse.com/security/cve/CVE-2015-1246/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1247 page", "url": "https://www.suse.com/security/cve/CVE-2015-1247/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1248 page", "url": "https://www.suse.com/security/cve/CVE-2015-1248/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1249 page", "url": "https://www.suse.com/security/cve/CVE-2015-1249/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1250 page", "url": "https://www.suse.com/security/cve/CVE-2015-1250/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1251 page", "url": "https://www.suse.com/security/cve/CVE-2015-1251/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1252 page", "url": "https://www.suse.com/security/cve/CVE-2015-1252/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1253 page", "url": "https://www.suse.com/security/cve/CVE-2015-1253/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1254 page", "url": "https://www.suse.com/security/cve/CVE-2015-1254/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1255 page", "url": "https://www.suse.com/security/cve/CVE-2015-1255/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1256 page", "url": "https://www.suse.com/security/cve/CVE-2015-1256/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1257 page", "url": "https://www.suse.com/security/cve/CVE-2015-1257/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1258 page", "url": "https://www.suse.com/security/cve/CVE-2015-1258/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1259 page", "url": "https://www.suse.com/security/cve/CVE-2015-1259/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1260 page", "url": "https://www.suse.com/security/cve/CVE-2015-1260/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1261 page", "url": "https://www.suse.com/security/cve/CVE-2015-1261/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1262 page", "url": "https://www.suse.com/security/cve/CVE-2015-1262/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1263 page", "url": "https://www.suse.com/security/cve/CVE-2015-1263/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1264 page", "url": "https://www.suse.com/security/cve/CVE-2015-1264/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1265 page", "url": "https://www.suse.com/security/cve/CVE-2015-1265/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1266 page", "url": "https://www.suse.com/security/cve/CVE-2015-1266/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1267 page", "url": "https://www.suse.com/security/cve/CVE-2015-1267/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1268 page", "url": "https://www.suse.com/security/cve/CVE-2015-1268/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1269 page", "url": "https://www.suse.com/security/cve/CVE-2015-1269/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1270 page", "url": "https://www.suse.com/security/cve/CVE-2015-1270/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1271 page", "url": "https://www.suse.com/security/cve/CVE-2015-1271/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1272 page", "url": "https://www.suse.com/security/cve/CVE-2015-1272/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1273 page", "url": "https://www.suse.com/security/cve/CVE-2015-1273/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1274 page", "url": "https://www.suse.com/security/cve/CVE-2015-1274/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1275 page", "url": "https://www.suse.com/security/cve/CVE-2015-1275/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1276 page", "url": "https://www.suse.com/security/cve/CVE-2015-1276/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1277 page", "url": "https://www.suse.com/security/cve/CVE-2015-1277/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1278 page", "url": "https://www.suse.com/security/cve/CVE-2015-1278/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1279 page", "url": "https://www.suse.com/security/cve/CVE-2015-1279/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1280 page", "url": "https://www.suse.com/security/cve/CVE-2015-1280/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1281 page", "url": "https://www.suse.com/security/cve/CVE-2015-1281/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1282 page", "url": "https://www.suse.com/security/cve/CVE-2015-1282/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1283 page", "url": "https://www.suse.com/security/cve/CVE-2015-1283/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1284 page", "url": "https://www.suse.com/security/cve/CVE-2015-1284/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1285 page", "url": "https://www.suse.com/security/cve/CVE-2015-1285/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1286 page", "url": "https://www.suse.com/security/cve/CVE-2015-1286/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1287 page", "url": "https://www.suse.com/security/cve/CVE-2015-1287/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1288 page", "url": "https://www.suse.com/security/cve/CVE-2015-1288/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1289 page", "url": "https://www.suse.com/security/cve/CVE-2015-1289/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1291 page", "url": "https://www.suse.com/security/cve/CVE-2015-1291/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1292 page", "url": "https://www.suse.com/security/cve/CVE-2015-1292/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1293 page", "url": "https://www.suse.com/security/cve/CVE-2015-1293/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1294 page", "url": "https://www.suse.com/security/cve/CVE-2015-1294/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1295 page", "url": "https://www.suse.com/security/cve/CVE-2015-1295/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1296 page", "url": "https://www.suse.com/security/cve/CVE-2015-1296/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1297 page", "url": "https://www.suse.com/security/cve/CVE-2015-1297/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1298 page", "url": "https://www.suse.com/security/cve/CVE-2015-1298/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1299 page", "url": "https://www.suse.com/security/cve/CVE-2015-1299/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1300 page", "url": "https://www.suse.com/security/cve/CVE-2015-1300/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1301 page", "url": "https://www.suse.com/security/cve/CVE-2015-1301/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1302 page", "url": "https://www.suse.com/security/cve/CVE-2015-1302/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1303 page", "url": "https://www.suse.com/security/cve/CVE-2015-1303/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1304 page", "url": "https://www.suse.com/security/cve/CVE-2015-1304/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6755 page", "url": "https://www.suse.com/security/cve/CVE-2015-6755/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6756 page", "url": "https://www.suse.com/security/cve/CVE-2015-6756/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6757 page", "url": "https://www.suse.com/security/cve/CVE-2015-6757/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6758 page", "url": "https://www.suse.com/security/cve/CVE-2015-6758/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6759 page", "url": "https://www.suse.com/security/cve/CVE-2015-6759/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6760 page", "url": "https://www.suse.com/security/cve/CVE-2015-6760/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6761 page", "url": "https://www.suse.com/security/cve/CVE-2015-6761/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6762 page", "url": "https://www.suse.com/security/cve/CVE-2015-6762/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6763 page", "url": "https://www.suse.com/security/cve/CVE-2015-6763/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6764 page", "url": "https://www.suse.com/security/cve/CVE-2015-6764/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6765 page", "url": "https://www.suse.com/security/cve/CVE-2015-6765/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6766 page", "url": "https://www.suse.com/security/cve/CVE-2015-6766/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6767 page", "url": "https://www.suse.com/security/cve/CVE-2015-6767/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6768 page", "url": "https://www.suse.com/security/cve/CVE-2015-6768/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6769 page", "url": "https://www.suse.com/security/cve/CVE-2015-6769/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6770 page", "url": "https://www.suse.com/security/cve/CVE-2015-6770/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6771 page", "url": "https://www.suse.com/security/cve/CVE-2015-6771/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6772 page", "url": "https://www.suse.com/security/cve/CVE-2015-6772/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6773 page", "url": "https://www.suse.com/security/cve/CVE-2015-6773/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6774 page", "url": "https://www.suse.com/security/cve/CVE-2015-6774/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6775 page", "url": "https://www.suse.com/security/cve/CVE-2015-6775/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6776 page", "url": "https://www.suse.com/security/cve/CVE-2015-6776/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6777 page", "url": "https://www.suse.com/security/cve/CVE-2015-6777/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6778 page", "url": "https://www.suse.com/security/cve/CVE-2015-6778/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6779 page", "url": "https://www.suse.com/security/cve/CVE-2015-6779/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6780 page", "url": "https://www.suse.com/security/cve/CVE-2015-6780/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6781 page", "url": "https://www.suse.com/security/cve/CVE-2015-6781/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6782 page", "url": "https://www.suse.com/security/cve/CVE-2015-6782/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6783 page", "url": "https://www.suse.com/security/cve/CVE-2015-6783/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6784 page", "url": "https://www.suse.com/security/cve/CVE-2015-6784/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6785 page", "url": "https://www.suse.com/security/cve/CVE-2015-6785/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6786 page", "url": "https://www.suse.com/security/cve/CVE-2015-6786/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6787 page", "url": "https://www.suse.com/security/cve/CVE-2015-6787/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6788 page", "url": "https://www.suse.com/security/cve/CVE-2015-6788/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6789 page", "url": "https://www.suse.com/security/cve/CVE-2015-6789/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6790 page", "url": "https://www.suse.com/security/cve/CVE-2015-6790/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6791 page", "url": "https://www.suse.com/security/cve/CVE-2015-6791/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6792 page", "url": "https://www.suse.com/security/cve/CVE-2015-6792/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7834 page", "url": "https://www.suse.com/security/cve/CVE-2015-7834/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8126 page", "url": "https://www.suse.com/security/cve/CVE-2015-8126/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1612 page", "url": "https://www.suse.com/security/cve/CVE-2016-1612/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1613 page", "url": "https://www.suse.com/security/cve/CVE-2016-1613/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1614 page", "url": "https://www.suse.com/security/cve/CVE-2016-1614/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1615 page", "url": "https://www.suse.com/security/cve/CVE-2016-1615/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1616 page", "url": "https://www.suse.com/security/cve/CVE-2016-1616/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1617 page", "url": "https://www.suse.com/security/cve/CVE-2016-1617/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1618 page", "url": "https://www.suse.com/security/cve/CVE-2016-1618/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1619 page", "url": "https://www.suse.com/security/cve/CVE-2016-1619/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1620 page", "url": "https://www.suse.com/security/cve/CVE-2016-1620/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1622 page", "url": "https://www.suse.com/security/cve/CVE-2016-1622/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1623 page", "url": "https://www.suse.com/security/cve/CVE-2016-1623/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1624 page", "url": "https://www.suse.com/security/cve/CVE-2016-1624/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1625 page", "url": "https://www.suse.com/security/cve/CVE-2016-1625/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1626 page", "url": "https://www.suse.com/security/cve/CVE-2016-1626/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1627 page", "url": "https://www.suse.com/security/cve/CVE-2016-1627/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1629 page", "url": "https://www.suse.com/security/cve/CVE-2016-1629/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1630 page", "url": "https://www.suse.com/security/cve/CVE-2016-1630/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1631 page", "url": "https://www.suse.com/security/cve/CVE-2016-1631/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1632 page", "url": "https://www.suse.com/security/cve/CVE-2016-1632/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1633 page", "url": "https://www.suse.com/security/cve/CVE-2016-1633/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1634 page", "url": "https://www.suse.com/security/cve/CVE-2016-1634/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1635 page", "url": "https://www.suse.com/security/cve/CVE-2016-1635/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1636 page", "url": "https://www.suse.com/security/cve/CVE-2016-1636/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1637 page", "url": "https://www.suse.com/security/cve/CVE-2016-1637/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1638 page", "url": "https://www.suse.com/security/cve/CVE-2016-1638/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1639 page", "url": "https://www.suse.com/security/cve/CVE-2016-1639/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1640 page", "url": "https://www.suse.com/security/cve/CVE-2016-1640/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1641 page", "url": "https://www.suse.com/security/cve/CVE-2016-1641/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1642 page", "url": "https://www.suse.com/security/cve/CVE-2016-1642/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1643 page", "url": "https://www.suse.com/security/cve/CVE-2016-1643/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1644 page", "url": "https://www.suse.com/security/cve/CVE-2016-1644/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1645 page", "url": "https://www.suse.com/security/cve/CVE-2016-1645/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1646 page", "url": "https://www.suse.com/security/cve/CVE-2016-1646/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1647 page", "url": "https://www.suse.com/security/cve/CVE-2016-1647/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1648 page", "url": "https://www.suse.com/security/cve/CVE-2016-1648/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1649 page", "url": "https://www.suse.com/security/cve/CVE-2016-1649/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1650 page", "url": "https://www.suse.com/security/cve/CVE-2016-1650/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1651 page", "url": "https://www.suse.com/security/cve/CVE-2016-1651/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1652 page", "url": "https://www.suse.com/security/cve/CVE-2016-1652/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1653 page", "url": "https://www.suse.com/security/cve/CVE-2016-1653/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1654 page", "url": "https://www.suse.com/security/cve/CVE-2016-1654/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1655 page", "url": "https://www.suse.com/security/cve/CVE-2016-1655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1656 page", "url": "https://www.suse.com/security/cve/CVE-2016-1656/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1657 page", "url": "https://www.suse.com/security/cve/CVE-2016-1657/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1658 page", "url": "https://www.suse.com/security/cve/CVE-2016-1658/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1659 page", "url": "https://www.suse.com/security/cve/CVE-2016-1659/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1660 page", "url": "https://www.suse.com/security/cve/CVE-2016-1660/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1661 page", "url": "https://www.suse.com/security/cve/CVE-2016-1661/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1662 page", "url": "https://www.suse.com/security/cve/CVE-2016-1662/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1663 page", "url": "https://www.suse.com/security/cve/CVE-2016-1663/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1664 page", "url": "https://www.suse.com/security/cve/CVE-2016-1664/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1665 page", "url": "https://www.suse.com/security/cve/CVE-2016-1665/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1666 page", "url": "https://www.suse.com/security/cve/CVE-2016-1666/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1667 page", "url": "https://www.suse.com/security/cve/CVE-2016-1667/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1668 page", "url": "https://www.suse.com/security/cve/CVE-2016-1668/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1669 page", "url": "https://www.suse.com/security/cve/CVE-2016-1669/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1670 page", "url": "https://www.suse.com/security/cve/CVE-2016-1670/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1672 page", "url": "https://www.suse.com/security/cve/CVE-2016-1672/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1673 page", "url": "https://www.suse.com/security/cve/CVE-2016-1673/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1674 page", "url": "https://www.suse.com/security/cve/CVE-2016-1674/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1675 page", "url": "https://www.suse.com/security/cve/CVE-2016-1675/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1676 page", "url": "https://www.suse.com/security/cve/CVE-2016-1676/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1677 page", "url": "https://www.suse.com/security/cve/CVE-2016-1677/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1678 page", "url": "https://www.suse.com/security/cve/CVE-2016-1678/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1679 page", "url": "https://www.suse.com/security/cve/CVE-2016-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1680 page", "url": "https://www.suse.com/security/cve/CVE-2016-1680/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1681 page", "url": "https://www.suse.com/security/cve/CVE-2016-1681/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1682 page", "url": "https://www.suse.com/security/cve/CVE-2016-1682/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1683 page", "url": "https://www.suse.com/security/cve/CVE-2016-1683/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1684 page", "url": "https://www.suse.com/security/cve/CVE-2016-1684/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1685 page", "url": "https://www.suse.com/security/cve/CVE-2016-1685/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1686 page", "url": "https://www.suse.com/security/cve/CVE-2016-1686/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1687 page", "url": "https://www.suse.com/security/cve/CVE-2016-1687/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1688 page", "url": "https://www.suse.com/security/cve/CVE-2016-1688/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1689 page", "url": "https://www.suse.com/security/cve/CVE-2016-1689/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1690 page", "url": "https://www.suse.com/security/cve/CVE-2016-1690/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1691 page", "url": "https://www.suse.com/security/cve/CVE-2016-1691/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1692 page", "url": "https://www.suse.com/security/cve/CVE-2016-1692/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1693 page", "url": "https://www.suse.com/security/cve/CVE-2016-1693/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1694 page", "url": "https://www.suse.com/security/cve/CVE-2016-1694/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1695 page", "url": "https://www.suse.com/security/cve/CVE-2016-1695/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1696 page", "url": "https://www.suse.com/security/cve/CVE-2016-1696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1697 page", "url": "https://www.suse.com/security/cve/CVE-2016-1697/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1698 page", "url": "https://www.suse.com/security/cve/CVE-2016-1698/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1699 page", "url": "https://www.suse.com/security/cve/CVE-2016-1699/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1700 page", "url": "https://www.suse.com/security/cve/CVE-2016-1700/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1701 page", "url": "https://www.suse.com/security/cve/CVE-2016-1701/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1702 page", "url": "https://www.suse.com/security/cve/CVE-2016-1702/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1703 page", "url": "https://www.suse.com/security/cve/CVE-2016-1703/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1704 page", "url": "https://www.suse.com/security/cve/CVE-2016-1704/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1705 page", "url": "https://www.suse.com/security/cve/CVE-2016-1705/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1706 page", "url": "https://www.suse.com/security/cve/CVE-2016-1706/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1707 page", "url": "https://www.suse.com/security/cve/CVE-2016-1707/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1708 page", "url": "https://www.suse.com/security/cve/CVE-2016-1708/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1709 page", "url": "https://www.suse.com/security/cve/CVE-2016-1709/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1710 page", "url": "https://www.suse.com/security/cve/CVE-2016-1710/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1711 page", "url": "https://www.suse.com/security/cve/CVE-2016-1711/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3679 page", "url": "https://www.suse.com/security/cve/CVE-2016-3679/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5127 page", "url": "https://www.suse.com/security/cve/CVE-2016-5127/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5128 page", "url": "https://www.suse.com/security/cve/CVE-2016-5128/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5129 page", "url": "https://www.suse.com/security/cve/CVE-2016-5129/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5130 page", "url": "https://www.suse.com/security/cve/CVE-2016-5130/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5131 page", "url": "https://www.suse.com/security/cve/CVE-2016-5131/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5132 page", "url": "https://www.suse.com/security/cve/CVE-2016-5132/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5133 page", "url": "https://www.suse.com/security/cve/CVE-2016-5133/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5134 page", "url": "https://www.suse.com/security/cve/CVE-2016-5134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5135 page", "url": "https://www.suse.com/security/cve/CVE-2016-5135/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5136 page", "url": "https://www.suse.com/security/cve/CVE-2016-5136/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5137 page", "url": "https://www.suse.com/security/cve/CVE-2016-5137/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5139 page", "url": "https://www.suse.com/security/cve/CVE-2016-5139/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5140 page", "url": "https://www.suse.com/security/cve/CVE-2016-5140/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5141 page", "url": "https://www.suse.com/security/cve/CVE-2016-5141/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5142 page", "url": "https://www.suse.com/security/cve/CVE-2016-5142/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5143 page", "url": "https://www.suse.com/security/cve/CVE-2016-5143/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5144 page", "url": "https://www.suse.com/security/cve/CVE-2016-5144/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5145 page", "url": "https://www.suse.com/security/cve/CVE-2016-5145/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5146 page", "url": "https://www.suse.com/security/cve/CVE-2016-5146/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5147 page", "url": "https://www.suse.com/security/cve/CVE-2016-5147/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5148 page", "url": "https://www.suse.com/security/cve/CVE-2016-5148/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5149 page", "url": "https://www.suse.com/security/cve/CVE-2016-5149/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5150 page", "url": "https://www.suse.com/security/cve/CVE-2016-5150/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5151 page", "url": "https://www.suse.com/security/cve/CVE-2016-5151/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5152 page", "url": "https://www.suse.com/security/cve/CVE-2016-5152/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5153 page", "url": "https://www.suse.com/security/cve/CVE-2016-5153/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5154 page", "url": "https://www.suse.com/security/cve/CVE-2016-5154/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5155 page", "url": "https://www.suse.com/security/cve/CVE-2016-5155/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5156 page", "url": "https://www.suse.com/security/cve/CVE-2016-5156/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5157 page", "url": "https://www.suse.com/security/cve/CVE-2016-5157/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5158 page", "url": "https://www.suse.com/security/cve/CVE-2016-5158/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5159 page", "url": "https://www.suse.com/security/cve/CVE-2016-5159/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5160 page", "url": "https://www.suse.com/security/cve/CVE-2016-5160/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5161 page", "url": "https://www.suse.com/security/cve/CVE-2016-5161/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5162 page", "url": "https://www.suse.com/security/cve/CVE-2016-5162/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5163 page", "url": "https://www.suse.com/security/cve/CVE-2016-5163/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5164 page", "url": "https://www.suse.com/security/cve/CVE-2016-5164/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5165 page", "url": "https://www.suse.com/security/cve/CVE-2016-5165/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5166 page", "url": "https://www.suse.com/security/cve/CVE-2016-5166/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5170 page", "url": "https://www.suse.com/security/cve/CVE-2016-5170/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5171 page", "url": "https://www.suse.com/security/cve/CVE-2016-5171/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5172 page", "url": "https://www.suse.com/security/cve/CVE-2016-5172/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5173 page", "url": "https://www.suse.com/security/cve/CVE-2016-5173/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5174 page", "url": "https://www.suse.com/security/cve/CVE-2016-5174/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5175 page", "url": "https://www.suse.com/security/cve/CVE-2016-5175/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5177 page", "url": "https://www.suse.com/security/cve/CVE-2016-5177/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5178 page", "url": "https://www.suse.com/security/cve/CVE-2016-5178/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5181 page", "url": "https://www.suse.com/security/cve/CVE-2016-5181/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5182 page", "url": "https://www.suse.com/security/cve/CVE-2016-5182/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5183 page", "url": "https://www.suse.com/security/cve/CVE-2016-5183/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5184 page", "url": "https://www.suse.com/security/cve/CVE-2016-5184/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5185 page", "url": "https://www.suse.com/security/cve/CVE-2016-5185/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5186 page", "url": "https://www.suse.com/security/cve/CVE-2016-5186/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5187 page", "url": "https://www.suse.com/security/cve/CVE-2016-5187/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5188 page", "url": "https://www.suse.com/security/cve/CVE-2016-5188/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5189 page", "url": "https://www.suse.com/security/cve/CVE-2016-5189/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5190 page", "url": "https://www.suse.com/security/cve/CVE-2016-5190/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5191 page", "url": "https://www.suse.com/security/cve/CVE-2016-5191/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5192 page", "url": "https://www.suse.com/security/cve/CVE-2016-5192/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5193 page", "url": "https://www.suse.com/security/cve/CVE-2016-5193/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5198 page", "url": "https://www.suse.com/security/cve/CVE-2016-5198/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5199 page", "url": "https://www.suse.com/security/cve/CVE-2016-5199/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5200 page", "url": "https://www.suse.com/security/cve/CVE-2016-5200/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5201 page", "url": "https://www.suse.com/security/cve/CVE-2016-5201/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5202 page", "url": "https://www.suse.com/security/cve/CVE-2016-5202/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5204 page", "url": "https://www.suse.com/security/cve/CVE-2016-5204/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5211 page", "url": "https://www.suse.com/security/cve/CVE-2016-5211/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5217 page", "url": "https://www.suse.com/security/cve/CVE-2016-5217/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5222 page", "url": "https://www.suse.com/security/cve/CVE-2016-5222/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5224 page", "url": "https://www.suse.com/security/cve/CVE-2016-5224/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9651 page", "url": "https://www.suse.com/security/cve/CVE-2016-9651/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11215 page", "url": "https://www.suse.com/security/cve/CVE-2017-11215/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11225 page", "url": "https://www.suse.com/security/cve/CVE-2017-11225/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15386 page", "url": "https://www.suse.com/security/cve/CVE-2017-15386/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15387 page", "url": "https://www.suse.com/security/cve/CVE-2017-15387/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15388 page", "url": "https://www.suse.com/security/cve/CVE-2017-15388/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15389 page", "url": "https://www.suse.com/security/cve/CVE-2017-15389/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15390 page", "url": "https://www.suse.com/security/cve/CVE-2017-15390/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15391 page", "url": "https://www.suse.com/security/cve/CVE-2017-15391/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15392 page", "url": "https://www.suse.com/security/cve/CVE-2017-15392/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15393 page", "url": "https://www.suse.com/security/cve/CVE-2017-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15394 page", "url": "https://www.suse.com/security/cve/CVE-2017-15394/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15395 page", "url": "https://www.suse.com/security/cve/CVE-2017-15395/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15396 page", "url": "https://www.suse.com/security/cve/CVE-2017-15396/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15398 page", "url": "https://www.suse.com/security/cve/CVE-2017-15398/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15399 page", "url": "https://www.suse.com/security/cve/CVE-2017-15399/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15407 page", "url": "https://www.suse.com/security/cve/CVE-2017-15407/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15408 page", "url": "https://www.suse.com/security/cve/CVE-2017-15408/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15409 page", "url": "https://www.suse.com/security/cve/CVE-2017-15409/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15410 page", "url": "https://www.suse.com/security/cve/CVE-2017-15410/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15411 page", "url": "https://www.suse.com/security/cve/CVE-2017-15411/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15412 page", "url": "https://www.suse.com/security/cve/CVE-2017-15412/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15413 page", "url": "https://www.suse.com/security/cve/CVE-2017-15413/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15415 page", "url": "https://www.suse.com/security/cve/CVE-2017-15415/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15416 page", "url": "https://www.suse.com/security/cve/CVE-2017-15416/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15417 page", "url": "https://www.suse.com/security/cve/CVE-2017-15417/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15418 page", "url": "https://www.suse.com/security/cve/CVE-2017-15418/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15419 page", "url": "https://www.suse.com/security/cve/CVE-2017-15419/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15420 page", "url": "https://www.suse.com/security/cve/CVE-2017-15420/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15422 page", "url": "https://www.suse.com/security/cve/CVE-2017-15422/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15423 page", "url": "https://www.suse.com/security/cve/CVE-2017-15423/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15424 page", "url": "https://www.suse.com/security/cve/CVE-2017-15424/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15425 page", "url": "https://www.suse.com/security/cve/CVE-2017-15425/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15426 page", "url": "https://www.suse.com/security/cve/CVE-2017-15426/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15427 page", "url": "https://www.suse.com/security/cve/CVE-2017-15427/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15429 page", "url": "https://www.suse.com/security/cve/CVE-2017-15429/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15430 page", "url": "https://www.suse.com/security/cve/CVE-2017-15430/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5006 page", "url": "https://www.suse.com/security/cve/CVE-2017-5006/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5007 page", "url": "https://www.suse.com/security/cve/CVE-2017-5007/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5008 page", "url": "https://www.suse.com/security/cve/CVE-2017-5008/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5009 page", "url": "https://www.suse.com/security/cve/CVE-2017-5009/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5010 page", "url": "https://www.suse.com/security/cve/CVE-2017-5010/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5011 page", "url": "https://www.suse.com/security/cve/CVE-2017-5011/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5012 page", "url": "https://www.suse.com/security/cve/CVE-2017-5012/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5013 page", "url": "https://www.suse.com/security/cve/CVE-2017-5013/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5014 page", "url": "https://www.suse.com/security/cve/CVE-2017-5014/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5015 page", "url": "https://www.suse.com/security/cve/CVE-2017-5015/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5016 page", "url": "https://www.suse.com/security/cve/CVE-2017-5016/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5017 page", "url": "https://www.suse.com/security/cve/CVE-2017-5017/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5018 page", "url": "https://www.suse.com/security/cve/CVE-2017-5018/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5019 page", "url": "https://www.suse.com/security/cve/CVE-2017-5019/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5020 page", "url": "https://www.suse.com/security/cve/CVE-2017-5020/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5021 page", "url": "https://www.suse.com/security/cve/CVE-2017-5021/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5022 page", "url": "https://www.suse.com/security/cve/CVE-2017-5022/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5023 page", "url": "https://www.suse.com/security/cve/CVE-2017-5023/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5024 page", "url": "https://www.suse.com/security/cve/CVE-2017-5024/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5025 page", "url": "https://www.suse.com/security/cve/CVE-2017-5025/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5026 page", "url": "https://www.suse.com/security/cve/CVE-2017-5026/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5030 page", "url": "https://www.suse.com/security/cve/CVE-2017-5030/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5035 page", "url": "https://www.suse.com/security/cve/CVE-2017-5035/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5041 page", "url": "https://www.suse.com/security/cve/CVE-2017-5041/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5044 page", "url": "https://www.suse.com/security/cve/CVE-2017-5044/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5052 page", "url": "https://www.suse.com/security/cve/CVE-2017-5052/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5053 page", "url": "https://www.suse.com/security/cve/CVE-2017-5053/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5054 page", "url": "https://www.suse.com/security/cve/CVE-2017-5054/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5055 page", "url": "https://www.suse.com/security/cve/CVE-2017-5055/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5056 page", "url": "https://www.suse.com/security/cve/CVE-2017-5056/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5057 page", "url": "https://www.suse.com/security/cve/CVE-2017-5057/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5058 page", "url": "https://www.suse.com/security/cve/CVE-2017-5058/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5059 page", "url": "https://www.suse.com/security/cve/CVE-2017-5059/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5060 page", "url": "https://www.suse.com/security/cve/CVE-2017-5060/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5061 page", "url": "https://www.suse.com/security/cve/CVE-2017-5061/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5062 page", "url": "https://www.suse.com/security/cve/CVE-2017-5062/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5063 page", "url": "https://www.suse.com/security/cve/CVE-2017-5063/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5064 page", "url": "https://www.suse.com/security/cve/CVE-2017-5064/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5065 page", "url": "https://www.suse.com/security/cve/CVE-2017-5065/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5066 page", "url": "https://www.suse.com/security/cve/CVE-2017-5066/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5067 page", "url": "https://www.suse.com/security/cve/CVE-2017-5067/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5068 page", "url": "https://www.suse.com/security/cve/CVE-2017-5068/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5069 page", "url": "https://www.suse.com/security/cve/CVE-2017-5069/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5070 page", "url": "https://www.suse.com/security/cve/CVE-2017-5070/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5071 page", "url": "https://www.suse.com/security/cve/CVE-2017-5071/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5072 page", "url": "https://www.suse.com/security/cve/CVE-2017-5072/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5073 page", "url": "https://www.suse.com/security/cve/CVE-2017-5073/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5074 page", "url": "https://www.suse.com/security/cve/CVE-2017-5074/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5075 page", "url": "https://www.suse.com/security/cve/CVE-2017-5075/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5076 page", "url": "https://www.suse.com/security/cve/CVE-2017-5076/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5077 page", "url": "https://www.suse.com/security/cve/CVE-2017-5077/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5078 page", "url": "https://www.suse.com/security/cve/CVE-2017-5078/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5079 page", "url": "https://www.suse.com/security/cve/CVE-2017-5079/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5080 page", "url": "https://www.suse.com/security/cve/CVE-2017-5080/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5081 page", "url": "https://www.suse.com/security/cve/CVE-2017-5081/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5082 page", "url": "https://www.suse.com/security/cve/CVE-2017-5082/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5083 page", "url": "https://www.suse.com/security/cve/CVE-2017-5083/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5085 page", "url": "https://www.suse.com/security/cve/CVE-2017-5085/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5086 page", "url": "https://www.suse.com/security/cve/CVE-2017-5086/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5087 page", "url": "https://www.suse.com/security/cve/CVE-2017-5087/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5088 page", "url": "https://www.suse.com/security/cve/CVE-2017-5088/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5089 page", "url": "https://www.suse.com/security/cve/CVE-2017-5089/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5091 page", "url": "https://www.suse.com/security/cve/CVE-2017-5091/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5092 page", "url": "https://www.suse.com/security/cve/CVE-2017-5092/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5093 page", "url": "https://www.suse.com/security/cve/CVE-2017-5093/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5094 page", "url": "https://www.suse.com/security/cve/CVE-2017-5094/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5095 page", "url": "https://www.suse.com/security/cve/CVE-2017-5095/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5096 page", "url": "https://www.suse.com/security/cve/CVE-2017-5096/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5097 page", "url": "https://www.suse.com/security/cve/CVE-2017-5097/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5098 page", "url": "https://www.suse.com/security/cve/CVE-2017-5098/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5099 page", "url": "https://www.suse.com/security/cve/CVE-2017-5099/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5100 page", "url": "https://www.suse.com/security/cve/CVE-2017-5100/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5101 page", "url": "https://www.suse.com/security/cve/CVE-2017-5101/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5102 page", "url": "https://www.suse.com/security/cve/CVE-2017-5102/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5103 page", "url": "https://www.suse.com/security/cve/CVE-2017-5103/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5104 page", "url": "https://www.suse.com/security/cve/CVE-2017-5104/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5105 page", "url": "https://www.suse.com/security/cve/CVE-2017-5105/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5106 page", "url": "https://www.suse.com/security/cve/CVE-2017-5106/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5107 page", "url": "https://www.suse.com/security/cve/CVE-2017-5107/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5108 page", "url": "https://www.suse.com/security/cve/CVE-2017-5108/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5109 page", "url": "https://www.suse.com/security/cve/CVE-2017-5109/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5110 page", "url": "https://www.suse.com/security/cve/CVE-2017-5110/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5111 page", "url": "https://www.suse.com/security/cve/CVE-2017-5111/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5112 page", "url": "https://www.suse.com/security/cve/CVE-2017-5112/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5113 page", "url": "https://www.suse.com/security/cve/CVE-2017-5113/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5114 page", "url": "https://www.suse.com/security/cve/CVE-2017-5114/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5115 page", "url": "https://www.suse.com/security/cve/CVE-2017-5115/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5116 page", "url": "https://www.suse.com/security/cve/CVE-2017-5116/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5117 page", "url": "https://www.suse.com/security/cve/CVE-2017-5117/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5118 page", "url": "https://www.suse.com/security/cve/CVE-2017-5118/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5119 page", "url": "https://www.suse.com/security/cve/CVE-2017-5119/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5120 page", "url": "https://www.suse.com/security/cve/CVE-2017-5120/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5121 page", "url": "https://www.suse.com/security/cve/CVE-2017-5121/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5122 page", "url": "https://www.suse.com/security/cve/CVE-2017-5122/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5124 page", "url": "https://www.suse.com/security/cve/CVE-2017-5124/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5125 page", "url": "https://www.suse.com/security/cve/CVE-2017-5125/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5126 page", "url": "https://www.suse.com/security/cve/CVE-2017-5126/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5127 page", "url": "https://www.suse.com/security/cve/CVE-2017-5127/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5128 page", "url": "https://www.suse.com/security/cve/CVE-2017-5128/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5129 page", "url": "https://www.suse.com/security/cve/CVE-2017-5129/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5130 page", "url": "https://www.suse.com/security/cve/CVE-2017-5130/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5131 page", "url": "https://www.suse.com/security/cve/CVE-2017-5131/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5132 page", "url": "https://www.suse.com/security/cve/CVE-2017-5132/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5133 page", "url": "https://www.suse.com/security/cve/CVE-2017-5133/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7000 page", "url": "https://www.suse.com/security/cve/CVE-2017-7000/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16065 page", "url": "https://www.suse.com/security/cve/CVE-2018-16065/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16066 page", "url": "https://www.suse.com/security/cve/CVE-2018-16066/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16067 page", "url": "https://www.suse.com/security/cve/CVE-2018-16067/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16068 page", "url": "https://www.suse.com/security/cve/CVE-2018-16068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16069 page", "url": "https://www.suse.com/security/cve/CVE-2018-16069/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16070 page", "url": "https://www.suse.com/security/cve/CVE-2018-16070/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16071 page", "url": "https://www.suse.com/security/cve/CVE-2018-16071/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16073 page", "url": "https://www.suse.com/security/cve/CVE-2018-16073/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16074 page", "url": "https://www.suse.com/security/cve/CVE-2018-16074/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16075 page", "url": "https://www.suse.com/security/cve/CVE-2018-16075/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16076 page", "url": "https://www.suse.com/security/cve/CVE-2018-16076/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16077 page", "url": "https://www.suse.com/security/cve/CVE-2018-16077/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16078 page", "url": "https://www.suse.com/security/cve/CVE-2018-16078/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16079 page", "url": "https://www.suse.com/security/cve/CVE-2018-16079/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16080 page", "url": "https://www.suse.com/security/cve/CVE-2018-16080/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16081 page", "url": "https://www.suse.com/security/cve/CVE-2018-16081/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16082 page", "url": "https://www.suse.com/security/cve/CVE-2018-16082/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16083 page", "url": "https://www.suse.com/security/cve/CVE-2018-16083/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16084 page", "url": "https://www.suse.com/security/cve/CVE-2018-16084/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16085 page", "url": "https://www.suse.com/security/cve/CVE-2018-16085/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16086 page", "url": "https://www.suse.com/security/cve/CVE-2018-16086/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16087 page", "url": "https://www.suse.com/security/cve/CVE-2018-16087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16088 page", "url": "https://www.suse.com/security/cve/CVE-2018-16088/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17462 page", "url": "https://www.suse.com/security/cve/CVE-2018-17462/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17463 page", "url": "https://www.suse.com/security/cve/CVE-2018-17463/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17464 page", "url": "https://www.suse.com/security/cve/CVE-2018-17464/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17465 page", "url": "https://www.suse.com/security/cve/CVE-2018-17465/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17466 page", "url": "https://www.suse.com/security/cve/CVE-2018-17466/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17467 page", "url": "https://www.suse.com/security/cve/CVE-2018-17467/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17468 page", "url": "https://www.suse.com/security/cve/CVE-2018-17468/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17469 page", "url": "https://www.suse.com/security/cve/CVE-2018-17469/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17470 page", "url": "https://www.suse.com/security/cve/CVE-2018-17470/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17471 page", "url": "https://www.suse.com/security/cve/CVE-2018-17471/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17472 page", "url": "https://www.suse.com/security/cve/CVE-2018-17472/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17473 page", "url": "https://www.suse.com/security/cve/CVE-2018-17473/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17474 page", "url": "https://www.suse.com/security/cve/CVE-2018-17474/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17475 page", "url": "https://www.suse.com/security/cve/CVE-2018-17475/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17476 page", "url": "https://www.suse.com/security/cve/CVE-2018-17476/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17477 page", "url": "https://www.suse.com/security/cve/CVE-2018-17477/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17478 page", "url": "https://www.suse.com/security/cve/CVE-2018-17478/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17479 page", "url": "https://www.suse.com/security/cve/CVE-2018-17479/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17480 page", "url": "https://www.suse.com/security/cve/CVE-2018-17480/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17481 page", "url": "https://www.suse.com/security/cve/CVE-2018-17481/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18335 page", "url": "https://www.suse.com/security/cve/CVE-2018-18335/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18336 page", "url": "https://www.suse.com/security/cve/CVE-2018-18336/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18337 page", "url": "https://www.suse.com/security/cve/CVE-2018-18337/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18338 page", "url": "https://www.suse.com/security/cve/CVE-2018-18338/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18339 page", "url": "https://www.suse.com/security/cve/CVE-2018-18339/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18340 page", "url": "https://www.suse.com/security/cve/CVE-2018-18340/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18341 page", "url": "https://www.suse.com/security/cve/CVE-2018-18341/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18342 page", "url": "https://www.suse.com/security/cve/CVE-2018-18342/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18343 page", "url": "https://www.suse.com/security/cve/CVE-2018-18343/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18344 page", "url": "https://www.suse.com/security/cve/CVE-2018-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18345 page", "url": "https://www.suse.com/security/cve/CVE-2018-18345/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18346 page", "url": "https://www.suse.com/security/cve/CVE-2018-18346/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18347 page", "url": "https://www.suse.com/security/cve/CVE-2018-18347/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18348 page", "url": "https://www.suse.com/security/cve/CVE-2018-18348/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18349 page", "url": "https://www.suse.com/security/cve/CVE-2018-18349/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18350 page", "url": "https://www.suse.com/security/cve/CVE-2018-18350/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18351 page", "url": "https://www.suse.com/security/cve/CVE-2018-18351/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18352 page", "url": "https://www.suse.com/security/cve/CVE-2018-18352/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18353 page", "url": "https://www.suse.com/security/cve/CVE-2018-18353/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18354 page", "url": "https://www.suse.com/security/cve/CVE-2018-18354/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18355 page", "url": "https://www.suse.com/security/cve/CVE-2018-18355/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18356 page", "url": "https://www.suse.com/security/cve/CVE-2018-18356/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18357 page", "url": "https://www.suse.com/security/cve/CVE-2018-18357/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18358 page", "url": "https://www.suse.com/security/cve/CVE-2018-18358/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18359 page", "url": "https://www.suse.com/security/cve/CVE-2018-18359/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20073 page", "url": "https://www.suse.com/security/cve/CVE-2018-20073/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-4117 page", "url": "https://www.suse.com/security/cve/CVE-2018-4117/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5179 page", "url": "https://www.suse.com/security/cve/CVE-2018-5179/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6031 page", "url": "https://www.suse.com/security/cve/CVE-2018-6031/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6032 page", "url": "https://www.suse.com/security/cve/CVE-2018-6032/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6033 page", "url": "https://www.suse.com/security/cve/CVE-2018-6033/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6034 page", "url": "https://www.suse.com/security/cve/CVE-2018-6034/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6035 page", "url": "https://www.suse.com/security/cve/CVE-2018-6035/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6036 page", "url": "https://www.suse.com/security/cve/CVE-2018-6036/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6037 page", "url": "https://www.suse.com/security/cve/CVE-2018-6037/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6038 page", "url": "https://www.suse.com/security/cve/CVE-2018-6038/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6039 page", "url": "https://www.suse.com/security/cve/CVE-2018-6039/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6040 page", "url": "https://www.suse.com/security/cve/CVE-2018-6040/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6041 page", "url": "https://www.suse.com/security/cve/CVE-2018-6041/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6042 page", "url": "https://www.suse.com/security/cve/CVE-2018-6042/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6043 page", "url": "https://www.suse.com/security/cve/CVE-2018-6043/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6044 page", "url": "https://www.suse.com/security/cve/CVE-2018-6044/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6045 page", "url": "https://www.suse.com/security/cve/CVE-2018-6045/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6046 page", "url": "https://www.suse.com/security/cve/CVE-2018-6046/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6047 page", "url": "https://www.suse.com/security/cve/CVE-2018-6047/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6048 page", "url": "https://www.suse.com/security/cve/CVE-2018-6048/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6049 page", "url": "https://www.suse.com/security/cve/CVE-2018-6049/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6050 page", "url": "https://www.suse.com/security/cve/CVE-2018-6050/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6051 page", "url": "https://www.suse.com/security/cve/CVE-2018-6051/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6052 page", "url": "https://www.suse.com/security/cve/CVE-2018-6052/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6053 page", "url": "https://www.suse.com/security/cve/CVE-2018-6053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6054 page", "url": "https://www.suse.com/security/cve/CVE-2018-6054/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6056 page", "url": "https://www.suse.com/security/cve/CVE-2018-6056/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6057 page", "url": "https://www.suse.com/security/cve/CVE-2018-6057/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6060 page", "url": "https://www.suse.com/security/cve/CVE-2018-6060/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6061 page", "url": "https://www.suse.com/security/cve/CVE-2018-6061/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6062 page", "url": "https://www.suse.com/security/cve/CVE-2018-6062/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6063 page", "url": "https://www.suse.com/security/cve/CVE-2018-6063/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6064 page", "url": "https://www.suse.com/security/cve/CVE-2018-6064/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6065 page", "url": "https://www.suse.com/security/cve/CVE-2018-6065/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6066 page", "url": "https://www.suse.com/security/cve/CVE-2018-6066/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6067 page", "url": "https://www.suse.com/security/cve/CVE-2018-6067/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6068 page", "url": "https://www.suse.com/security/cve/CVE-2018-6068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6069 page", "url": "https://www.suse.com/security/cve/CVE-2018-6069/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6070 page", "url": "https://www.suse.com/security/cve/CVE-2018-6070/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6071 page", "url": "https://www.suse.com/security/cve/CVE-2018-6071/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6072 page", "url": "https://www.suse.com/security/cve/CVE-2018-6072/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6073 page", "url": "https://www.suse.com/security/cve/CVE-2018-6073/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6074 page", "url": "https://www.suse.com/security/cve/CVE-2018-6074/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6075 page", "url": "https://www.suse.com/security/cve/CVE-2018-6075/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6076 page", "url": "https://www.suse.com/security/cve/CVE-2018-6076/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6077 page", "url": "https://www.suse.com/security/cve/CVE-2018-6077/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6078 page", "url": "https://www.suse.com/security/cve/CVE-2018-6078/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6079 page", "url": "https://www.suse.com/security/cve/CVE-2018-6079/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6080 page", "url": "https://www.suse.com/security/cve/CVE-2018-6080/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6081 page", "url": "https://www.suse.com/security/cve/CVE-2018-6081/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6082 page", "url": "https://www.suse.com/security/cve/CVE-2018-6082/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6083 page", "url": "https://www.suse.com/security/cve/CVE-2018-6083/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6085 page", "url": "https://www.suse.com/security/cve/CVE-2018-6085/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6086 page", "url": "https://www.suse.com/security/cve/CVE-2018-6086/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6087 page", "url": "https://www.suse.com/security/cve/CVE-2018-6087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6088 page", "url": "https://www.suse.com/security/cve/CVE-2018-6088/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6089 page", "url": "https://www.suse.com/security/cve/CVE-2018-6089/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6090 page", "url": "https://www.suse.com/security/cve/CVE-2018-6090/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6091 page", "url": "https://www.suse.com/security/cve/CVE-2018-6091/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6092 page", "url": "https://www.suse.com/security/cve/CVE-2018-6092/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6093 page", "url": "https://www.suse.com/security/cve/CVE-2018-6093/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6094 page", "url": "https://www.suse.com/security/cve/CVE-2018-6094/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6095 page", "url": "https://www.suse.com/security/cve/CVE-2018-6095/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6096 page", "url": "https://www.suse.com/security/cve/CVE-2018-6096/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6097 page", "url": "https://www.suse.com/security/cve/CVE-2018-6097/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6098 page", "url": "https://www.suse.com/security/cve/CVE-2018-6098/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6099 page", "url": "https://www.suse.com/security/cve/CVE-2018-6099/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6100 page", "url": "https://www.suse.com/security/cve/CVE-2018-6100/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6101 page", "url": "https://www.suse.com/security/cve/CVE-2018-6101/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6102 page", "url": "https://www.suse.com/security/cve/CVE-2018-6102/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6103 page", "url": "https://www.suse.com/security/cve/CVE-2018-6103/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6104 page", "url": "https://www.suse.com/security/cve/CVE-2018-6104/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6105 page", "url": "https://www.suse.com/security/cve/CVE-2018-6105/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6106 page", "url": "https://www.suse.com/security/cve/CVE-2018-6106/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6107 page", "url": "https://www.suse.com/security/cve/CVE-2018-6107/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6108 page", "url": "https://www.suse.com/security/cve/CVE-2018-6108/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6109 page", "url": "https://www.suse.com/security/cve/CVE-2018-6109/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6110 page", "url": "https://www.suse.com/security/cve/CVE-2018-6110/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6111 page", "url": "https://www.suse.com/security/cve/CVE-2018-6111/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6112 page", "url": "https://www.suse.com/security/cve/CVE-2018-6112/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6113 page", "url": "https://www.suse.com/security/cve/CVE-2018-6113/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6114 page", "url": "https://www.suse.com/security/cve/CVE-2018-6114/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6115 page", "url": "https://www.suse.com/security/cve/CVE-2018-6115/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6116 page", "url": "https://www.suse.com/security/cve/CVE-2018-6116/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6117 page", "url": "https://www.suse.com/security/cve/CVE-2018-6117/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6118 page", "url": "https://www.suse.com/security/cve/CVE-2018-6118/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6120 page", "url": "https://www.suse.com/security/cve/CVE-2018-6120/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6121 page", "url": "https://www.suse.com/security/cve/CVE-2018-6121/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6122 page", "url": "https://www.suse.com/security/cve/CVE-2018-6122/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6123 page", "url": "https://www.suse.com/security/cve/CVE-2018-6123/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6124 page", "url": "https://www.suse.com/security/cve/CVE-2018-6124/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6125 page", "url": "https://www.suse.com/security/cve/CVE-2018-6125/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6126 page", "url": "https://www.suse.com/security/cve/CVE-2018-6126/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6127 page", "url": "https://www.suse.com/security/cve/CVE-2018-6127/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6128 page", "url": "https://www.suse.com/security/cve/CVE-2018-6128/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6129 page", "url": "https://www.suse.com/security/cve/CVE-2018-6129/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6130 page", "url": "https://www.suse.com/security/cve/CVE-2018-6130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6131 page", "url": "https://www.suse.com/security/cve/CVE-2018-6131/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6132 page", "url": "https://www.suse.com/security/cve/CVE-2018-6132/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6133 page", "url": "https://www.suse.com/security/cve/CVE-2018-6133/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6134 page", "url": "https://www.suse.com/security/cve/CVE-2018-6134/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6135 page", "url": "https://www.suse.com/security/cve/CVE-2018-6135/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6136 page", "url": "https://www.suse.com/security/cve/CVE-2018-6136/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6137 page", "url": "https://www.suse.com/security/cve/CVE-2018-6137/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6138 page", "url": "https://www.suse.com/security/cve/CVE-2018-6138/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6139 page", "url": "https://www.suse.com/security/cve/CVE-2018-6139/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6140 page", "url": "https://www.suse.com/security/cve/CVE-2018-6140/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6141 page", "url": "https://www.suse.com/security/cve/CVE-2018-6141/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6142 page", "url": "https://www.suse.com/security/cve/CVE-2018-6142/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6143 page", "url": "https://www.suse.com/security/cve/CVE-2018-6143/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6144 page", "url": "https://www.suse.com/security/cve/CVE-2018-6144/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6145 page", "url": "https://www.suse.com/security/cve/CVE-2018-6145/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6147 page", "url": "https://www.suse.com/security/cve/CVE-2018-6147/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6148 page", "url": "https://www.suse.com/security/cve/CVE-2018-6148/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6149 page", "url": "https://www.suse.com/security/cve/CVE-2018-6149/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6153 page", "url": "https://www.suse.com/security/cve/CVE-2018-6153/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6154 page", "url": "https://www.suse.com/security/cve/CVE-2018-6154/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6155 page", "url": "https://www.suse.com/security/cve/CVE-2018-6155/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6156 page", "url": "https://www.suse.com/security/cve/CVE-2018-6156/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6157 page", "url": "https://www.suse.com/security/cve/CVE-2018-6157/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6158 page", "url": "https://www.suse.com/security/cve/CVE-2018-6158/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6159 page", "url": "https://www.suse.com/security/cve/CVE-2018-6159/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6160 page", "url": "https://www.suse.com/security/cve/CVE-2018-6160/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6161 page", "url": "https://www.suse.com/security/cve/CVE-2018-6161/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6162 page", "url": "https://www.suse.com/security/cve/CVE-2018-6162/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6163 page", "url": "https://www.suse.com/security/cve/CVE-2018-6163/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6164 page", "url": "https://www.suse.com/security/cve/CVE-2018-6164/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6165 page", "url": "https://www.suse.com/security/cve/CVE-2018-6165/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6166 page", "url": "https://www.suse.com/security/cve/CVE-2018-6166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6167 page", "url": "https://www.suse.com/security/cve/CVE-2018-6167/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6168 page", "url": "https://www.suse.com/security/cve/CVE-2018-6168/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6169 page", "url": "https://www.suse.com/security/cve/CVE-2018-6169/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6170 page", "url": "https://www.suse.com/security/cve/CVE-2018-6170/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6171 page", "url": "https://www.suse.com/security/cve/CVE-2018-6171/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6172 page", "url": "https://www.suse.com/security/cve/CVE-2018-6172/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6173 page", "url": "https://www.suse.com/security/cve/CVE-2018-6173/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6174 page", "url": "https://www.suse.com/security/cve/CVE-2018-6174/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6175 page", "url": "https://www.suse.com/security/cve/CVE-2018-6175/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6176 page", "url": "https://www.suse.com/security/cve/CVE-2018-6176/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6177 page", "url": "https://www.suse.com/security/cve/CVE-2018-6177/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6178 page", "url": "https://www.suse.com/security/cve/CVE-2018-6178/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6179 page", "url": "https://www.suse.com/security/cve/CVE-2018-6179/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6406 page", "url": "https://www.suse.com/security/cve/CVE-2018-6406/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13659 page", "url": "https://www.suse.com/security/cve/CVE-2019-13659/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13660 page", "url": "https://www.suse.com/security/cve/CVE-2019-13660/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13661 page", "url": "https://www.suse.com/security/cve/CVE-2019-13661/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13662 page", "url": "https://www.suse.com/security/cve/CVE-2019-13662/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13663 page", "url": "https://www.suse.com/security/cve/CVE-2019-13663/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13664 page", "url": "https://www.suse.com/security/cve/CVE-2019-13664/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13665 page", "url": "https://www.suse.com/security/cve/CVE-2019-13665/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13666 page", "url": "https://www.suse.com/security/cve/CVE-2019-13666/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13667 page", "url": "https://www.suse.com/security/cve/CVE-2019-13667/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13668 page", "url": "https://www.suse.com/security/cve/CVE-2019-13668/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13669 page", "url": "https://www.suse.com/security/cve/CVE-2019-13669/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13670 page", "url": "https://www.suse.com/security/cve/CVE-2019-13670/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13671 page", "url": "https://www.suse.com/security/cve/CVE-2019-13671/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13673 page", "url": "https://www.suse.com/security/cve/CVE-2019-13673/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13674 page", "url": "https://www.suse.com/security/cve/CVE-2019-13674/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13675 page", "url": "https://www.suse.com/security/cve/CVE-2019-13675/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13676 page", "url": "https://www.suse.com/security/cve/CVE-2019-13676/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13677 page", "url": "https://www.suse.com/security/cve/CVE-2019-13677/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13678 page", "url": "https://www.suse.com/security/cve/CVE-2019-13678/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13679 page", "url": "https://www.suse.com/security/cve/CVE-2019-13679/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13680 page", "url": "https://www.suse.com/security/cve/CVE-2019-13680/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13681 page", "url": "https://www.suse.com/security/cve/CVE-2019-13681/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13682 page", "url": "https://www.suse.com/security/cve/CVE-2019-13682/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13683 page", "url": "https://www.suse.com/security/cve/CVE-2019-13683/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13685 page", "url": "https://www.suse.com/security/cve/CVE-2019-13685/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13686 page", "url": "https://www.suse.com/security/cve/CVE-2019-13686/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13687 page", "url": "https://www.suse.com/security/cve/CVE-2019-13687/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13688 page", "url": "https://www.suse.com/security/cve/CVE-2019-13688/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13693 page", "url": "https://www.suse.com/security/cve/CVE-2019-13693/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13694 page", "url": "https://www.suse.com/security/cve/CVE-2019-13694/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13695 page", "url": "https://www.suse.com/security/cve/CVE-2019-13695/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13696 page", "url": "https://www.suse.com/security/cve/CVE-2019-13696/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13697 page", "url": "https://www.suse.com/security/cve/CVE-2019-13697/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13699 page", "url": "https://www.suse.com/security/cve/CVE-2019-13699/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13700 page", "url": "https://www.suse.com/security/cve/CVE-2019-13700/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13701 page", "url": "https://www.suse.com/security/cve/CVE-2019-13701/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13702 page", "url": "https://www.suse.com/security/cve/CVE-2019-13702/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13703 page", "url": "https://www.suse.com/security/cve/CVE-2019-13703/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13704 page", "url": "https://www.suse.com/security/cve/CVE-2019-13704/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13705 page", "url": "https://www.suse.com/security/cve/CVE-2019-13705/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13706 page", "url": "https://www.suse.com/security/cve/CVE-2019-13706/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13707 page", "url": "https://www.suse.com/security/cve/CVE-2019-13707/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13708 page", "url": "https://www.suse.com/security/cve/CVE-2019-13708/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13709 page", "url": "https://www.suse.com/security/cve/CVE-2019-13709/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13710 page", "url": "https://www.suse.com/security/cve/CVE-2019-13710/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13711 page", "url": "https://www.suse.com/security/cve/CVE-2019-13711/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13713 page", "url": "https://www.suse.com/security/cve/CVE-2019-13713/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13714 page", "url": "https://www.suse.com/security/cve/CVE-2019-13714/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13715 page", "url": "https://www.suse.com/security/cve/CVE-2019-13715/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13716 page", "url": "https://www.suse.com/security/cve/CVE-2019-13716/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13717 page", "url": "https://www.suse.com/security/cve/CVE-2019-13717/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13718 page", "url": "https://www.suse.com/security/cve/CVE-2019-13718/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13719 page", "url": "https://www.suse.com/security/cve/CVE-2019-13719/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13720 page", "url": "https://www.suse.com/security/cve/CVE-2019-13720/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13721 page", "url": "https://www.suse.com/security/cve/CVE-2019-13721/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13723 page", "url": "https://www.suse.com/security/cve/CVE-2019-13723/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13724 page", "url": "https://www.suse.com/security/cve/CVE-2019-13724/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13725 page", "url": "https://www.suse.com/security/cve/CVE-2019-13725/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13726 page", "url": "https://www.suse.com/security/cve/CVE-2019-13726/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13727 page", "url": "https://www.suse.com/security/cve/CVE-2019-13727/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13728 page", "url": "https://www.suse.com/security/cve/CVE-2019-13728/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13729 page", "url": "https://www.suse.com/security/cve/CVE-2019-13729/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13730 page", "url": "https://www.suse.com/security/cve/CVE-2019-13730/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13732 page", "url": "https://www.suse.com/security/cve/CVE-2019-13732/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13734 page", "url": "https://www.suse.com/security/cve/CVE-2019-13734/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13735 page", "url": "https://www.suse.com/security/cve/CVE-2019-13735/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13736 page", "url": "https://www.suse.com/security/cve/CVE-2019-13736/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13737 page", "url": "https://www.suse.com/security/cve/CVE-2019-13737/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13738 page", "url": "https://www.suse.com/security/cve/CVE-2019-13738/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13739 page", "url": "https://www.suse.com/security/cve/CVE-2019-13739/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13740 page", "url": "https://www.suse.com/security/cve/CVE-2019-13740/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13741 page", "url": "https://www.suse.com/security/cve/CVE-2019-13741/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13742 page", "url": "https://www.suse.com/security/cve/CVE-2019-13742/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13743 page", "url": "https://www.suse.com/security/cve/CVE-2019-13743/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13744 page", "url": "https://www.suse.com/security/cve/CVE-2019-13744/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13745 page", "url": "https://www.suse.com/security/cve/CVE-2019-13745/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13746 page", "url": "https://www.suse.com/security/cve/CVE-2019-13746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13747 page", "url": "https://www.suse.com/security/cve/CVE-2019-13747/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13748 page", "url": "https://www.suse.com/security/cve/CVE-2019-13748/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13749 page", "url": "https://www.suse.com/security/cve/CVE-2019-13749/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13750 page", "url": "https://www.suse.com/security/cve/CVE-2019-13750/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13751 page", "url": "https://www.suse.com/security/cve/CVE-2019-13751/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13752 page", "url": "https://www.suse.com/security/cve/CVE-2019-13752/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13753 page", "url": "https://www.suse.com/security/cve/CVE-2019-13753/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13754 page", "url": "https://www.suse.com/security/cve/CVE-2019-13754/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13755 page", "url": "https://www.suse.com/security/cve/CVE-2019-13755/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13756 page", "url": "https://www.suse.com/security/cve/CVE-2019-13756/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13757 page", "url": "https://www.suse.com/security/cve/CVE-2019-13757/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13758 page", "url": "https://www.suse.com/security/cve/CVE-2019-13758/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13759 page", "url": "https://www.suse.com/security/cve/CVE-2019-13759/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13761 page", "url": "https://www.suse.com/security/cve/CVE-2019-13761/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13762 page", "url": "https://www.suse.com/security/cve/CVE-2019-13762/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13763 page", "url": "https://www.suse.com/security/cve/CVE-2019-13763/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13764 page", "url": "https://www.suse.com/security/cve/CVE-2019-13764/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13767 page", "url": "https://www.suse.com/security/cve/CVE-2019-13767/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15903 page", "url": "https://www.suse.com/security/cve/CVE-2019-15903/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18197 page", "url": "https://www.suse.com/security/cve/CVE-2019-18197/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19880 page", "url": "https://www.suse.com/security/cve/CVE-2019-19880/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19923 page", "url": "https://www.suse.com/security/cve/CVE-2019-19923/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19926 page", "url": "https://www.suse.com/security/cve/CVE-2019-19926/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20503 page", "url": "https://www.suse.com/security/cve/CVE-2019-20503/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5754 page", "url": "https://www.suse.com/security/cve/CVE-2019-5754/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5755 page", "url": "https://www.suse.com/security/cve/CVE-2019-5755/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5756 page", "url": "https://www.suse.com/security/cve/CVE-2019-5756/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5757 page", "url": "https://www.suse.com/security/cve/CVE-2019-5757/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5758 page", "url": "https://www.suse.com/security/cve/CVE-2019-5758/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5759 page", "url": "https://www.suse.com/security/cve/CVE-2019-5759/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5760 page", "url": "https://www.suse.com/security/cve/CVE-2019-5760/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5761 page", "url": "https://www.suse.com/security/cve/CVE-2019-5761/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5762 page", "url": "https://www.suse.com/security/cve/CVE-2019-5762/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5763 page", "url": "https://www.suse.com/security/cve/CVE-2019-5763/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5764 page", "url": "https://www.suse.com/security/cve/CVE-2019-5764/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5765 page", "url": "https://www.suse.com/security/cve/CVE-2019-5765/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5766 page", "url": "https://www.suse.com/security/cve/CVE-2019-5766/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5767 page", "url": "https://www.suse.com/security/cve/CVE-2019-5767/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5768 page", "url": "https://www.suse.com/security/cve/CVE-2019-5768/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5769 page", "url": "https://www.suse.com/security/cve/CVE-2019-5769/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5770 page", "url": "https://www.suse.com/security/cve/CVE-2019-5770/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5771 page", "url": "https://www.suse.com/security/cve/CVE-2019-5771/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5772 page", "url": "https://www.suse.com/security/cve/CVE-2019-5772/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5773 page", "url": "https://www.suse.com/security/cve/CVE-2019-5773/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5774 page", "url": "https://www.suse.com/security/cve/CVE-2019-5774/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5775 page", "url": "https://www.suse.com/security/cve/CVE-2019-5775/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5776 page", "url": "https://www.suse.com/security/cve/CVE-2019-5776/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5777 page", "url": "https://www.suse.com/security/cve/CVE-2019-5777/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5778 page", "url": "https://www.suse.com/security/cve/CVE-2019-5778/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5779 page", "url": "https://www.suse.com/security/cve/CVE-2019-5779/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5780 page", "url": "https://www.suse.com/security/cve/CVE-2019-5780/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5781 page", "url": "https://www.suse.com/security/cve/CVE-2019-5781/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5782 page", "url": "https://www.suse.com/security/cve/CVE-2019-5782/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5784 page", "url": "https://www.suse.com/security/cve/CVE-2019-5784/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5786 page", "url": "https://www.suse.com/security/cve/CVE-2019-5786/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5787 page", "url": "https://www.suse.com/security/cve/CVE-2019-5787/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5788 page", "url": "https://www.suse.com/security/cve/CVE-2019-5788/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5789 page", "url": "https://www.suse.com/security/cve/CVE-2019-5789/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5790 page", "url": "https://www.suse.com/security/cve/CVE-2019-5790/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5791 page", "url": "https://www.suse.com/security/cve/CVE-2019-5791/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5792 page", "url": "https://www.suse.com/security/cve/CVE-2019-5792/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5793 page", "url": "https://www.suse.com/security/cve/CVE-2019-5793/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5794 page", "url": "https://www.suse.com/security/cve/CVE-2019-5794/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5795 page", "url": "https://www.suse.com/security/cve/CVE-2019-5795/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5796 page", "url": "https://www.suse.com/security/cve/CVE-2019-5796/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5797 page", "url": "https://www.suse.com/security/cve/CVE-2019-5797/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5798 page", "url": "https://www.suse.com/security/cve/CVE-2019-5798/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5799 page", "url": "https://www.suse.com/security/cve/CVE-2019-5799/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5800 page", "url": "https://www.suse.com/security/cve/CVE-2019-5800/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5801 page", "url": "https://www.suse.com/security/cve/CVE-2019-5801/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5802 page", "url": "https://www.suse.com/security/cve/CVE-2019-5802/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5803 page", "url": "https://www.suse.com/security/cve/CVE-2019-5803/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5804 page", "url": "https://www.suse.com/security/cve/CVE-2019-5804/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5805 page", "url": "https://www.suse.com/security/cve/CVE-2019-5805/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5806 page", "url": "https://www.suse.com/security/cve/CVE-2019-5806/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5807 page", "url": "https://www.suse.com/security/cve/CVE-2019-5807/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5808 page", "url": "https://www.suse.com/security/cve/CVE-2019-5808/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5809 page", "url": "https://www.suse.com/security/cve/CVE-2019-5809/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5810 page", "url": "https://www.suse.com/security/cve/CVE-2019-5810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5811 page", "url": "https://www.suse.com/security/cve/CVE-2019-5811/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5812 page", "url": "https://www.suse.com/security/cve/CVE-2019-5812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5813 page", "url": "https://www.suse.com/security/cve/CVE-2019-5813/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5814 page", "url": "https://www.suse.com/security/cve/CVE-2019-5814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5815 page", "url": "https://www.suse.com/security/cve/CVE-2019-5815/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5816 page", "url": "https://www.suse.com/security/cve/CVE-2019-5816/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5817 page", "url": "https://www.suse.com/security/cve/CVE-2019-5817/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5818 page", "url": "https://www.suse.com/security/cve/CVE-2019-5818/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5819 page", "url": "https://www.suse.com/security/cve/CVE-2019-5819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5820 page", "url": "https://www.suse.com/security/cve/CVE-2019-5820/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5821 page", "url": "https://www.suse.com/security/cve/CVE-2019-5821/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5822 page", "url": "https://www.suse.com/security/cve/CVE-2019-5822/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5823 page", "url": "https://www.suse.com/security/cve/CVE-2019-5823/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5824 page", "url": "https://www.suse.com/security/cve/CVE-2019-5824/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5827 page", "url": "https://www.suse.com/security/cve/CVE-2019-5827/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5828 page", "url": "https://www.suse.com/security/cve/CVE-2019-5828/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5829 page", "url": "https://www.suse.com/security/cve/CVE-2019-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5830 page", "url": "https://www.suse.com/security/cve/CVE-2019-5830/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5831 page", "url": "https://www.suse.com/security/cve/CVE-2019-5831/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5832 page", "url": "https://www.suse.com/security/cve/CVE-2019-5832/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5833 page", "url": "https://www.suse.com/security/cve/CVE-2019-5833/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5834 page", "url": "https://www.suse.com/security/cve/CVE-2019-5834/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5835 page", "url": "https://www.suse.com/security/cve/CVE-2019-5835/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5836 page", "url": "https://www.suse.com/security/cve/CVE-2019-5836/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5837 page", "url": "https://www.suse.com/security/cve/CVE-2019-5837/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5838 page", "url": "https://www.suse.com/security/cve/CVE-2019-5838/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5839 page", "url": "https://www.suse.com/security/cve/CVE-2019-5839/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5840 page", "url": "https://www.suse.com/security/cve/CVE-2019-5840/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5842 page", "url": "https://www.suse.com/security/cve/CVE-2019-5842/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5844 page", "url": "https://www.suse.com/security/cve/CVE-2019-5844/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5847 page", "url": "https://www.suse.com/security/cve/CVE-2019-5847/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5848 page", "url": "https://www.suse.com/security/cve/CVE-2019-5848/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5850 page", "url": "https://www.suse.com/security/cve/CVE-2019-5850/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5851 page", "url": "https://www.suse.com/security/cve/CVE-2019-5851/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5852 page", "url": "https://www.suse.com/security/cve/CVE-2019-5852/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5853 page", "url": "https://www.suse.com/security/cve/CVE-2019-5853/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5854 page", "url": "https://www.suse.com/security/cve/CVE-2019-5854/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5855 page", "url": "https://www.suse.com/security/cve/CVE-2019-5855/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5856 page", "url": "https://www.suse.com/security/cve/CVE-2019-5856/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5857 page", "url": "https://www.suse.com/security/cve/CVE-2019-5857/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5858 page", "url": "https://www.suse.com/security/cve/CVE-2019-5858/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5859 page", "url": "https://www.suse.com/security/cve/CVE-2019-5859/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5860 page", "url": "https://www.suse.com/security/cve/CVE-2019-5860/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5861 page", "url": "https://www.suse.com/security/cve/CVE-2019-5861/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5862 page", "url": "https://www.suse.com/security/cve/CVE-2019-5862/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5863 page", "url": "https://www.suse.com/security/cve/CVE-2019-5863/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5864 page", "url": "https://www.suse.com/security/cve/CVE-2019-5864/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5865 page", "url": "https://www.suse.com/security/cve/CVE-2019-5865/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5867 page", "url": "https://www.suse.com/security/cve/CVE-2019-5867/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5868 page", "url": "https://www.suse.com/security/cve/CVE-2019-5868/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5869 page", "url": "https://www.suse.com/security/cve/CVE-2019-5869/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5870 page", "url": "https://www.suse.com/security/cve/CVE-2019-5870/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5871 page", "url": "https://www.suse.com/security/cve/CVE-2019-5871/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5872 page", "url": "https://www.suse.com/security/cve/CVE-2019-5872/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5874 page", "url": "https://www.suse.com/security/cve/CVE-2019-5874/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5875 page", "url": "https://www.suse.com/security/cve/CVE-2019-5875/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5876 page", "url": "https://www.suse.com/security/cve/CVE-2019-5876/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5877 page", "url": "https://www.suse.com/security/cve/CVE-2019-5877/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5878 page", "url": "https://www.suse.com/security/cve/CVE-2019-5878/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5879 page", "url": "https://www.suse.com/security/cve/CVE-2019-5879/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5880 page", "url": "https://www.suse.com/security/cve/CVE-2019-5880/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5881 page", "url": "https://www.suse.com/security/cve/CVE-2019-5881/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8075 page", "url": "https://www.suse.com/security/cve/CVE-2019-8075/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0561 page", "url": "https://www.suse.com/security/cve/CVE-2020-0561/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15959 page", "url": "https://www.suse.com/security/cve/CVE-2020-15959/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15960 page", "url": "https://www.suse.com/security/cve/CVE-2020-15960/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15961 page", "url": "https://www.suse.com/security/cve/CVE-2020-15961/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15962 page", "url": "https://www.suse.com/security/cve/CVE-2020-15962/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15963 page", "url": "https://www.suse.com/security/cve/CVE-2020-15963/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15964 page", "url": "https://www.suse.com/security/cve/CVE-2020-15964/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15965 page", "url": "https://www.suse.com/security/cve/CVE-2020-15965/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15966 page", "url": "https://www.suse.com/security/cve/CVE-2020-15966/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15967 page", "url": "https://www.suse.com/security/cve/CVE-2020-15967/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15968 page", "url": "https://www.suse.com/security/cve/CVE-2020-15968/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15969 page", "url": "https://www.suse.com/security/cve/CVE-2020-15969/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15970 page", "url": "https://www.suse.com/security/cve/CVE-2020-15970/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15971 page", "url": "https://www.suse.com/security/cve/CVE-2020-15971/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15972 page", "url": "https://www.suse.com/security/cve/CVE-2020-15972/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15973 page", "url": "https://www.suse.com/security/cve/CVE-2020-15973/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15974 page", "url": "https://www.suse.com/security/cve/CVE-2020-15974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15975 page", "url": "https://www.suse.com/security/cve/CVE-2020-15975/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15976 page", "url": "https://www.suse.com/security/cve/CVE-2020-15976/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15977 page", "url": "https://www.suse.com/security/cve/CVE-2020-15977/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15978 page", "url": "https://www.suse.com/security/cve/CVE-2020-15978/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15979 page", "url": "https://www.suse.com/security/cve/CVE-2020-15979/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15980 page", "url": "https://www.suse.com/security/cve/CVE-2020-15980/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15981 page", "url": "https://www.suse.com/security/cve/CVE-2020-15981/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15982 page", "url": "https://www.suse.com/security/cve/CVE-2020-15982/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15983 page", "url": "https://www.suse.com/security/cve/CVE-2020-15983/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15984 page", "url": "https://www.suse.com/security/cve/CVE-2020-15984/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15985 page", "url": "https://www.suse.com/security/cve/CVE-2020-15985/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15986 page", "url": "https://www.suse.com/security/cve/CVE-2020-15986/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15987 page", "url": "https://www.suse.com/security/cve/CVE-2020-15987/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15988 page", "url": "https://www.suse.com/security/cve/CVE-2020-15988/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15989 page", "url": "https://www.suse.com/security/cve/CVE-2020-15989/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15990 page", "url": "https://www.suse.com/security/cve/CVE-2020-15990/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15991 page", "url": "https://www.suse.com/security/cve/CVE-2020-15991/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15992 page", "url": "https://www.suse.com/security/cve/CVE-2020-15992/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15995 page", "url": "https://www.suse.com/security/cve/CVE-2020-15995/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15999 page", "url": "https://www.suse.com/security/cve/CVE-2020-15999/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16000 page", "url": "https://www.suse.com/security/cve/CVE-2020-16000/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16001 page", "url": "https://www.suse.com/security/cve/CVE-2020-16001/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16002 page", "url": "https://www.suse.com/security/cve/CVE-2020-16002/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16003 page", "url": "https://www.suse.com/security/cve/CVE-2020-16003/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16004 page", "url": "https://www.suse.com/security/cve/CVE-2020-16004/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16005 page", "url": "https://www.suse.com/security/cve/CVE-2020-16005/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16006 page", "url": "https://www.suse.com/security/cve/CVE-2020-16006/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16007 page", "url": "https://www.suse.com/security/cve/CVE-2020-16007/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16008 page", "url": "https://www.suse.com/security/cve/CVE-2020-16008/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16009 page", "url": "https://www.suse.com/security/cve/CVE-2020-16009/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16011 page", "url": "https://www.suse.com/security/cve/CVE-2020-16011/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16012 page", "url": "https://www.suse.com/security/cve/CVE-2020-16012/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16013 page", "url": "https://www.suse.com/security/cve/CVE-2020-16013/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16014 page", "url": "https://www.suse.com/security/cve/CVE-2020-16014/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16015 page", "url": "https://www.suse.com/security/cve/CVE-2020-16015/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16016 page", "url": "https://www.suse.com/security/cve/CVE-2020-16016/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16017 page", "url": "https://www.suse.com/security/cve/CVE-2020-16017/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16018 page", "url": "https://www.suse.com/security/cve/CVE-2020-16018/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16019 page", "url": "https://www.suse.com/security/cve/CVE-2020-16019/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16020 page", "url": "https://www.suse.com/security/cve/CVE-2020-16020/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16021 page", "url": "https://www.suse.com/security/cve/CVE-2020-16021/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16022 page", "url": "https://www.suse.com/security/cve/CVE-2020-16022/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16023 page", "url": "https://www.suse.com/security/cve/CVE-2020-16023/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16024 page", "url": "https://www.suse.com/security/cve/CVE-2020-16024/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16025 page", "url": "https://www.suse.com/security/cve/CVE-2020-16025/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16026 page", "url": "https://www.suse.com/security/cve/CVE-2020-16026/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16027 page", "url": "https://www.suse.com/security/cve/CVE-2020-16027/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16028 page", "url": "https://www.suse.com/security/cve/CVE-2020-16028/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16029 page", "url": "https://www.suse.com/security/cve/CVE-2020-16029/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16030 page", "url": "https://www.suse.com/security/cve/CVE-2020-16030/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16031 page", "url": "https://www.suse.com/security/cve/CVE-2020-16031/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16032 page", "url": "https://www.suse.com/security/cve/CVE-2020-16032/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16033 page", "url": "https://www.suse.com/security/cve/CVE-2020-16033/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16034 page", "url": "https://www.suse.com/security/cve/CVE-2020-16034/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16035 page", "url": "https://www.suse.com/security/cve/CVE-2020-16035/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16036 page", "url": "https://www.suse.com/security/cve/CVE-2020-16036/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16037 page", "url": "https://www.suse.com/security/cve/CVE-2020-16037/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16038 page", "url": "https://www.suse.com/security/cve/CVE-2020-16038/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16039 page", "url": "https://www.suse.com/security/cve/CVE-2020-16039/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16040 page", "url": "https://www.suse.com/security/cve/CVE-2020-16040/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16041 page", "url": "https://www.suse.com/security/cve/CVE-2020-16041/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16042 page", "url": "https://www.suse.com/security/cve/CVE-2020-16042/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16043 page", "url": "https://www.suse.com/security/cve/CVE-2020-16043/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16044 page", "url": "https://www.suse.com/security/cve/CVE-2020-16044/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27844 page", "url": "https://www.suse.com/security/cve/CVE-2020-27844/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6377 page", "url": "https://www.suse.com/security/cve/CVE-2020-6377/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6378 page", "url": "https://www.suse.com/security/cve/CVE-2020-6378/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6379 page", "url": "https://www.suse.com/security/cve/CVE-2020-6379/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6380 page", "url": "https://www.suse.com/security/cve/CVE-2020-6380/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6381 page", "url": "https://www.suse.com/security/cve/CVE-2020-6381/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6382 page", "url": "https://www.suse.com/security/cve/CVE-2020-6382/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6385 page", "url": "https://www.suse.com/security/cve/CVE-2020-6385/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6387 page", "url": "https://www.suse.com/security/cve/CVE-2020-6387/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6388 page", "url": "https://www.suse.com/security/cve/CVE-2020-6388/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6389 page", "url": "https://www.suse.com/security/cve/CVE-2020-6389/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6390 page", "url": "https://www.suse.com/security/cve/CVE-2020-6390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6391 page", "url": "https://www.suse.com/security/cve/CVE-2020-6391/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6392 page", "url": "https://www.suse.com/security/cve/CVE-2020-6392/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6393 page", "url": "https://www.suse.com/security/cve/CVE-2020-6393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6394 page", "url": "https://www.suse.com/security/cve/CVE-2020-6394/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6395 page", "url": "https://www.suse.com/security/cve/CVE-2020-6395/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6396 page", "url": "https://www.suse.com/security/cve/CVE-2020-6396/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6397 page", "url": "https://www.suse.com/security/cve/CVE-2020-6397/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6398 page", "url": "https://www.suse.com/security/cve/CVE-2020-6398/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6399 page", "url": "https://www.suse.com/security/cve/CVE-2020-6399/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6400 page", "url": "https://www.suse.com/security/cve/CVE-2020-6400/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6401 page", "url": "https://www.suse.com/security/cve/CVE-2020-6401/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6402 page", "url": "https://www.suse.com/security/cve/CVE-2020-6402/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6403 page", "url": "https://www.suse.com/security/cve/CVE-2020-6403/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6404 page", "url": "https://www.suse.com/security/cve/CVE-2020-6404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6405 page", "url": "https://www.suse.com/security/cve/CVE-2020-6405/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6406 page", "url": "https://www.suse.com/security/cve/CVE-2020-6406/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6407 page", "url": "https://www.suse.com/security/cve/CVE-2020-6407/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6408 page", "url": "https://www.suse.com/security/cve/CVE-2020-6408/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6409 page", "url": "https://www.suse.com/security/cve/CVE-2020-6409/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6410 page", "url": "https://www.suse.com/security/cve/CVE-2020-6410/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6411 page", "url": "https://www.suse.com/security/cve/CVE-2020-6411/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6412 page", "url": "https://www.suse.com/security/cve/CVE-2020-6412/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6413 page", "url": "https://www.suse.com/security/cve/CVE-2020-6413/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6414 page", "url": "https://www.suse.com/security/cve/CVE-2020-6414/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6415 page", "url": "https://www.suse.com/security/cve/CVE-2020-6415/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6416 page", "url": "https://www.suse.com/security/cve/CVE-2020-6416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6417 page", "url": "https://www.suse.com/security/cve/CVE-2020-6417/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6418 page", "url": "https://www.suse.com/security/cve/CVE-2020-6418/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6420 page", "url": "https://www.suse.com/security/cve/CVE-2020-6420/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6422 page", "url": "https://www.suse.com/security/cve/CVE-2020-6422/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6423 page", "url": "https://www.suse.com/security/cve/CVE-2020-6423/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6424 page", "url": "https://www.suse.com/security/cve/CVE-2020-6424/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6425 page", "url": "https://www.suse.com/security/cve/CVE-2020-6425/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6426 page", "url": "https://www.suse.com/security/cve/CVE-2020-6426/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6427 page", "url": "https://www.suse.com/security/cve/CVE-2020-6427/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6428 page", "url": "https://www.suse.com/security/cve/CVE-2020-6428/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6429 page", "url": "https://www.suse.com/security/cve/CVE-2020-6429/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6430 page", "url": "https://www.suse.com/security/cve/CVE-2020-6430/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6431 page", "url": "https://www.suse.com/security/cve/CVE-2020-6431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6432 page", "url": "https://www.suse.com/security/cve/CVE-2020-6432/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6433 page", "url": "https://www.suse.com/security/cve/CVE-2020-6433/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6434 page", "url": "https://www.suse.com/security/cve/CVE-2020-6434/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6435 page", "url": "https://www.suse.com/security/cve/CVE-2020-6435/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6436 page", "url": "https://www.suse.com/security/cve/CVE-2020-6436/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6437 page", "url": "https://www.suse.com/security/cve/CVE-2020-6437/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6438 page", "url": "https://www.suse.com/security/cve/CVE-2020-6438/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6439 page", "url": "https://www.suse.com/security/cve/CVE-2020-6439/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6440 page", "url": "https://www.suse.com/security/cve/CVE-2020-6440/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6441 page", "url": "https://www.suse.com/security/cve/CVE-2020-6441/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6442 page", "url": "https://www.suse.com/security/cve/CVE-2020-6442/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6443 page", "url": "https://www.suse.com/security/cve/CVE-2020-6443/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6444 page", "url": "https://www.suse.com/security/cve/CVE-2020-6444/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6445 page", "url": "https://www.suse.com/security/cve/CVE-2020-6445/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6446 page", "url": "https://www.suse.com/security/cve/CVE-2020-6446/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6447 page", "url": "https://www.suse.com/security/cve/CVE-2020-6447/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6448 page", "url": "https://www.suse.com/security/cve/CVE-2020-6448/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6449 page", "url": "https://www.suse.com/security/cve/CVE-2020-6449/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6450 page", "url": "https://www.suse.com/security/cve/CVE-2020-6450/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6451 page", "url": "https://www.suse.com/security/cve/CVE-2020-6451/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6452 page", "url": "https://www.suse.com/security/cve/CVE-2020-6452/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6454 page", "url": "https://www.suse.com/security/cve/CVE-2020-6454/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6455 page", "url": "https://www.suse.com/security/cve/CVE-2020-6455/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6456 page", "url": "https://www.suse.com/security/cve/CVE-2020-6456/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6457 page", "url": "https://www.suse.com/security/cve/CVE-2020-6457/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6458 page", "url": "https://www.suse.com/security/cve/CVE-2020-6458/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6459 page", "url": "https://www.suse.com/security/cve/CVE-2020-6459/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6460 page", "url": "https://www.suse.com/security/cve/CVE-2020-6460/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6462 page", "url": "https://www.suse.com/security/cve/CVE-2020-6462/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6463 page", "url": "https://www.suse.com/security/cve/CVE-2020-6463/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6464 page", "url": "https://www.suse.com/security/cve/CVE-2020-6464/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6465 page", "url": "https://www.suse.com/security/cve/CVE-2020-6465/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6466 page", "url": "https://www.suse.com/security/cve/CVE-2020-6466/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6467 page", "url": "https://www.suse.com/security/cve/CVE-2020-6467/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6468 page", "url": "https://www.suse.com/security/cve/CVE-2020-6468/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6469 page", "url": "https://www.suse.com/security/cve/CVE-2020-6469/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6470 page", "url": "https://www.suse.com/security/cve/CVE-2020-6470/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6471 page", "url": "https://www.suse.com/security/cve/CVE-2020-6471/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6472 page", "url": "https://www.suse.com/security/cve/CVE-2020-6472/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6473 page", "url": "https://www.suse.com/security/cve/CVE-2020-6473/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6474 page", "url": "https://www.suse.com/security/cve/CVE-2020-6474/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6475 page", "url": "https://www.suse.com/security/cve/CVE-2020-6475/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6476 page", "url": "https://www.suse.com/security/cve/CVE-2020-6476/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6477 page", "url": "https://www.suse.com/security/cve/CVE-2020-6477/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6478 page", "url": "https://www.suse.com/security/cve/CVE-2020-6478/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6479 page", "url": "https://www.suse.com/security/cve/CVE-2020-6479/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6480 page", "url": "https://www.suse.com/security/cve/CVE-2020-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6481 page", "url": "https://www.suse.com/security/cve/CVE-2020-6481/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6482 page", "url": "https://www.suse.com/security/cve/CVE-2020-6482/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6483 page", "url": "https://www.suse.com/security/cve/CVE-2020-6483/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6484 page", "url": "https://www.suse.com/security/cve/CVE-2020-6484/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6485 page", "url": "https://www.suse.com/security/cve/CVE-2020-6485/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6486 page", "url": "https://www.suse.com/security/cve/CVE-2020-6486/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6487 page", "url": "https://www.suse.com/security/cve/CVE-2020-6487/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6488 page", "url": "https://www.suse.com/security/cve/CVE-2020-6488/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6489 page", "url": "https://www.suse.com/security/cve/CVE-2020-6489/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6490 page", "url": "https://www.suse.com/security/cve/CVE-2020-6490/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6491 page", "url": "https://www.suse.com/security/cve/CVE-2020-6491/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6493 page", "url": "https://www.suse.com/security/cve/CVE-2020-6493/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6494 page", "url": "https://www.suse.com/security/cve/CVE-2020-6494/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6495 page", "url": "https://www.suse.com/security/cve/CVE-2020-6495/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6496 page", "url": "https://www.suse.com/security/cve/CVE-2020-6496/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6505 page", "url": "https://www.suse.com/security/cve/CVE-2020-6505/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6506 page", "url": "https://www.suse.com/security/cve/CVE-2020-6506/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6507 page", "url": "https://www.suse.com/security/cve/CVE-2020-6507/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6509 page", "url": "https://www.suse.com/security/cve/CVE-2020-6509/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6510 page", "url": "https://www.suse.com/security/cve/CVE-2020-6510/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6511 page", "url": "https://www.suse.com/security/cve/CVE-2020-6511/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6512 page", "url": "https://www.suse.com/security/cve/CVE-2020-6512/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6513 page", "url": "https://www.suse.com/security/cve/CVE-2020-6513/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6514 page", "url": "https://www.suse.com/security/cve/CVE-2020-6514/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6515 page", "url": "https://www.suse.com/security/cve/CVE-2020-6515/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6516 page", "url": "https://www.suse.com/security/cve/CVE-2020-6516/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6517 page", "url": "https://www.suse.com/security/cve/CVE-2020-6517/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6518 page", "url": "https://www.suse.com/security/cve/CVE-2020-6518/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6519 page", "url": "https://www.suse.com/security/cve/CVE-2020-6519/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6520 page", "url": "https://www.suse.com/security/cve/CVE-2020-6520/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6521 page", "url": "https://www.suse.com/security/cve/CVE-2020-6521/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6522 page", "url": "https://www.suse.com/security/cve/CVE-2020-6522/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6523 page", "url": "https://www.suse.com/security/cve/CVE-2020-6523/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6524 page", "url": "https://www.suse.com/security/cve/CVE-2020-6524/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6525 page", "url": "https://www.suse.com/security/cve/CVE-2020-6525/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6526 page", "url": "https://www.suse.com/security/cve/CVE-2020-6526/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6527 page", "url": "https://www.suse.com/security/cve/CVE-2020-6527/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6528 page", "url": "https://www.suse.com/security/cve/CVE-2020-6528/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6529 page", "url": "https://www.suse.com/security/cve/CVE-2020-6529/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6530 page", "url": "https://www.suse.com/security/cve/CVE-2020-6530/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6531 page", "url": "https://www.suse.com/security/cve/CVE-2020-6531/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6532 page", "url": "https://www.suse.com/security/cve/CVE-2020-6532/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6533 page", "url": "https://www.suse.com/security/cve/CVE-2020-6533/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6534 page", "url": "https://www.suse.com/security/cve/CVE-2020-6534/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6535 page", "url": "https://www.suse.com/security/cve/CVE-2020-6535/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6536 page", "url": "https://www.suse.com/security/cve/CVE-2020-6536/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6537 page", "url": "https://www.suse.com/security/cve/CVE-2020-6537/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6538 page", "url": "https://www.suse.com/security/cve/CVE-2020-6538/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6539 page", "url": "https://www.suse.com/security/cve/CVE-2020-6539/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6540 page", "url": "https://www.suse.com/security/cve/CVE-2020-6540/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6541 page", "url": "https://www.suse.com/security/cve/CVE-2020-6541/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6542 page", "url": "https://www.suse.com/security/cve/CVE-2020-6542/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6543 page", "url": "https://www.suse.com/security/cve/CVE-2020-6543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6544 page", "url": "https://www.suse.com/security/cve/CVE-2020-6544/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6545 page", "url": "https://www.suse.com/security/cve/CVE-2020-6545/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6546 page", "url": "https://www.suse.com/security/cve/CVE-2020-6546/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6547 page", "url": "https://www.suse.com/security/cve/CVE-2020-6547/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6548 page", "url": "https://www.suse.com/security/cve/CVE-2020-6548/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6549 page", "url": "https://www.suse.com/security/cve/CVE-2020-6549/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6550 page", "url": "https://www.suse.com/security/cve/CVE-2020-6550/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6551 page", "url": "https://www.suse.com/security/cve/CVE-2020-6551/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6552 page", "url": "https://www.suse.com/security/cve/CVE-2020-6552/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6553 page", "url": "https://www.suse.com/security/cve/CVE-2020-6553/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6554 page", "url": "https://www.suse.com/security/cve/CVE-2020-6554/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6555 page", "url": "https://www.suse.com/security/cve/CVE-2020-6555/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6556 page", "url": "https://www.suse.com/security/cve/CVE-2020-6556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6557 page", "url": "https://www.suse.com/security/cve/CVE-2020-6557/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6558 page", "url": "https://www.suse.com/security/cve/CVE-2020-6558/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6559 page", "url": "https://www.suse.com/security/cve/CVE-2020-6559/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6560 page", "url": "https://www.suse.com/security/cve/CVE-2020-6560/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6561 page", "url": "https://www.suse.com/security/cve/CVE-2020-6561/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6562 page", "url": "https://www.suse.com/security/cve/CVE-2020-6562/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6563 page", "url": "https://www.suse.com/security/cve/CVE-2020-6563/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6564 page", "url": "https://www.suse.com/security/cve/CVE-2020-6564/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6565 page", "url": "https://www.suse.com/security/cve/CVE-2020-6565/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6566 page", "url": "https://www.suse.com/security/cve/CVE-2020-6566/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6567 page", "url": "https://www.suse.com/security/cve/CVE-2020-6567/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6568 page", "url": "https://www.suse.com/security/cve/CVE-2020-6568/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6569 page", "url": "https://www.suse.com/security/cve/CVE-2020-6569/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6570 page", "url": "https://www.suse.com/security/cve/CVE-2020-6570/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6571 page", "url": "https://www.suse.com/security/cve/CVE-2020-6571/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6573 page", "url": "https://www.suse.com/security/cve/CVE-2020-6573/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6574 page", "url": "https://www.suse.com/security/cve/CVE-2020-6574/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6575 page", "url": "https://www.suse.com/security/cve/CVE-2020-6575/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6576 page", "url": "https://www.suse.com/security/cve/CVE-2020-6576/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6831 page", "url": "https://www.suse.com/security/cve/CVE-2020-6831/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21106 page", "url": "https://www.suse.com/security/cve/CVE-2021-21106/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21107 page", "url": "https://www.suse.com/security/cve/CVE-2021-21107/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21108 page", "url": "https://www.suse.com/security/cve/CVE-2021-21108/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21109 page", "url": "https://www.suse.com/security/cve/CVE-2021-21109/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21110 page", "url": "https://www.suse.com/security/cve/CVE-2021-21110/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21111 page", "url": "https://www.suse.com/security/cve/CVE-2021-21111/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21112 page", "url": "https://www.suse.com/security/cve/CVE-2021-21112/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21113 page", "url": "https://www.suse.com/security/cve/CVE-2021-21113/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21114 page", "url": "https://www.suse.com/security/cve/CVE-2021-21114/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21115 page", "url": "https://www.suse.com/security/cve/CVE-2021-21115/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21116 page", "url": "https://www.suse.com/security/cve/CVE-2021-21116/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21117 page", "url": "https://www.suse.com/security/cve/CVE-2021-21117/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21118 page", "url": "https://www.suse.com/security/cve/CVE-2021-21118/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21119 page", "url": "https://www.suse.com/security/cve/CVE-2021-21119/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21120 page", "url": "https://www.suse.com/security/cve/CVE-2021-21120/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21121 page", "url": "https://www.suse.com/security/cve/CVE-2021-21121/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21122 page", "url": "https://www.suse.com/security/cve/CVE-2021-21122/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21123 page", "url": "https://www.suse.com/security/cve/CVE-2021-21123/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21124 page", "url": "https://www.suse.com/security/cve/CVE-2021-21124/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21125 page", "url": "https://www.suse.com/security/cve/CVE-2021-21125/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21126 page", "url": "https://www.suse.com/security/cve/CVE-2021-21126/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21127 page", "url": "https://www.suse.com/security/cve/CVE-2021-21127/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21128 page", "url": "https://www.suse.com/security/cve/CVE-2021-21128/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21129 page", "url": "https://www.suse.com/security/cve/CVE-2021-21129/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21130 page", "url": "https://www.suse.com/security/cve/CVE-2021-21130/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21131 page", "url": "https://www.suse.com/security/cve/CVE-2021-21131/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21132 page", "url": "https://www.suse.com/security/cve/CVE-2021-21132/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21133 page", "url": "https://www.suse.com/security/cve/CVE-2021-21133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21134 page", "url": "https://www.suse.com/security/cve/CVE-2021-21134/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21135 page", "url": "https://www.suse.com/security/cve/CVE-2021-21135/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21136 page", "url": "https://www.suse.com/security/cve/CVE-2021-21136/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21137 page", "url": "https://www.suse.com/security/cve/CVE-2021-21137/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21138 page", "url": "https://www.suse.com/security/cve/CVE-2021-21138/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21139 page", "url": "https://www.suse.com/security/cve/CVE-2021-21139/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21140 page", "url": "https://www.suse.com/security/cve/CVE-2021-21140/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21141 page", "url": "https://www.suse.com/security/cve/CVE-2021-21141/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21142 page", "url": "https://www.suse.com/security/cve/CVE-2021-21142/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21143 page", "url": "https://www.suse.com/security/cve/CVE-2021-21143/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21144 page", "url": "https://www.suse.com/security/cve/CVE-2021-21144/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21145 page", "url": "https://www.suse.com/security/cve/CVE-2021-21145/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21146 page", "url": "https://www.suse.com/security/cve/CVE-2021-21146/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21147 page", "url": "https://www.suse.com/security/cve/CVE-2021-21147/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21148 page", "url": "https://www.suse.com/security/cve/CVE-2021-21148/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21149 page", "url": "https://www.suse.com/security/cve/CVE-2021-21149/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21150 page", "url": "https://www.suse.com/security/cve/CVE-2021-21150/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21151 page", "url": "https://www.suse.com/security/cve/CVE-2021-21151/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21152 page", "url": "https://www.suse.com/security/cve/CVE-2021-21152/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21153 page", "url": "https://www.suse.com/security/cve/CVE-2021-21153/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21154 page", "url": "https://www.suse.com/security/cve/CVE-2021-21154/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21155 page", "url": "https://www.suse.com/security/cve/CVE-2021-21155/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21156 page", "url": "https://www.suse.com/security/cve/CVE-2021-21156/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21157 page", "url": "https://www.suse.com/security/cve/CVE-2021-21157/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21159 page", "url": "https://www.suse.com/security/cve/CVE-2021-21159/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21160 page", "url": "https://www.suse.com/security/cve/CVE-2021-21160/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21161 page", "url": "https://www.suse.com/security/cve/CVE-2021-21161/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21162 page", "url": "https://www.suse.com/security/cve/CVE-2021-21162/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21163 page", "url": "https://www.suse.com/security/cve/CVE-2021-21163/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21164 page", "url": "https://www.suse.com/security/cve/CVE-2021-21164/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21165 page", "url": "https://www.suse.com/security/cve/CVE-2021-21165/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21166 page", "url": "https://www.suse.com/security/cve/CVE-2021-21166/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21167 page", "url": "https://www.suse.com/security/cve/CVE-2021-21167/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21168 page", "url": "https://www.suse.com/security/cve/CVE-2021-21168/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21169 page", "url": "https://www.suse.com/security/cve/CVE-2021-21169/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21170 page", "url": "https://www.suse.com/security/cve/CVE-2021-21170/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21171 page", "url": "https://www.suse.com/security/cve/CVE-2021-21171/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21172 page", "url": "https://www.suse.com/security/cve/CVE-2021-21172/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21173 page", "url": "https://www.suse.com/security/cve/CVE-2021-21173/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21174 page", "url": "https://www.suse.com/security/cve/CVE-2021-21174/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21175 page", "url": "https://www.suse.com/security/cve/CVE-2021-21175/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21176 page", "url": "https://www.suse.com/security/cve/CVE-2021-21176/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21177 page", "url": "https://www.suse.com/security/cve/CVE-2021-21177/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21178 page", "url": "https://www.suse.com/security/cve/CVE-2021-21178/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21179 page", "url": "https://www.suse.com/security/cve/CVE-2021-21179/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21180 page", "url": "https://www.suse.com/security/cve/CVE-2021-21180/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21181 page", "url": "https://www.suse.com/security/cve/CVE-2021-21181/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21182 page", "url": "https://www.suse.com/security/cve/CVE-2021-21182/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21183 page", "url": "https://www.suse.com/security/cve/CVE-2021-21183/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21184 page", "url": "https://www.suse.com/security/cve/CVE-2021-21184/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21185 page", "url": "https://www.suse.com/security/cve/CVE-2021-21185/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21186 page", "url": "https://www.suse.com/security/cve/CVE-2021-21186/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21187 page", "url": "https://www.suse.com/security/cve/CVE-2021-21187/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21188 page", "url": "https://www.suse.com/security/cve/CVE-2021-21188/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21189 page", "url": "https://www.suse.com/security/cve/CVE-2021-21189/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21190 page", "url": "https://www.suse.com/security/cve/CVE-2021-21190/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21191 page", "url": "https://www.suse.com/security/cve/CVE-2021-21191/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21192 page", "url": "https://www.suse.com/security/cve/CVE-2021-21192/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21193 page", "url": "https://www.suse.com/security/cve/CVE-2021-21193/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21194 page", "url": "https://www.suse.com/security/cve/CVE-2021-21194/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21195 page", "url": "https://www.suse.com/security/cve/CVE-2021-21195/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21196 page", "url": "https://www.suse.com/security/cve/CVE-2021-21196/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21197 page", "url": "https://www.suse.com/security/cve/CVE-2021-21197/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21198 page", "url": "https://www.suse.com/security/cve/CVE-2021-21198/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21199 page", "url": "https://www.suse.com/security/cve/CVE-2021-21199/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21201 page", "url": "https://www.suse.com/security/cve/CVE-2021-21201/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21202 page", "url": "https://www.suse.com/security/cve/CVE-2021-21202/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21203 page", "url": "https://www.suse.com/security/cve/CVE-2021-21203/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21204 page", "url": "https://www.suse.com/security/cve/CVE-2021-21204/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21205 page", "url": "https://www.suse.com/security/cve/CVE-2021-21205/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21206 page", "url": "https://www.suse.com/security/cve/CVE-2021-21206/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21207 page", "url": "https://www.suse.com/security/cve/CVE-2021-21207/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21208 page", "url": "https://www.suse.com/security/cve/CVE-2021-21208/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21209 page", "url": "https://www.suse.com/security/cve/CVE-2021-21209/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21210 page", "url": "https://www.suse.com/security/cve/CVE-2021-21210/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21211 page", "url": "https://www.suse.com/security/cve/CVE-2021-21211/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21212 page", "url": "https://www.suse.com/security/cve/CVE-2021-21212/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21213 page", "url": "https://www.suse.com/security/cve/CVE-2021-21213/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21214 page", "url": "https://www.suse.com/security/cve/CVE-2021-21214/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21215 page", "url": "https://www.suse.com/security/cve/CVE-2021-21215/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21216 page", "url": "https://www.suse.com/security/cve/CVE-2021-21216/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21217 page", "url": "https://www.suse.com/security/cve/CVE-2021-21217/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21218 page", "url": "https://www.suse.com/security/cve/CVE-2021-21218/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21219 page", "url": "https://www.suse.com/security/cve/CVE-2021-21219/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21220 page", "url": "https://www.suse.com/security/cve/CVE-2021-21220/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21221 page", "url": "https://www.suse.com/security/cve/CVE-2021-21221/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21222 page", "url": "https://www.suse.com/security/cve/CVE-2021-21222/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21223 page", "url": "https://www.suse.com/security/cve/CVE-2021-21223/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21224 page", "url": "https://www.suse.com/security/cve/CVE-2021-21224/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21225 page", "url": "https://www.suse.com/security/cve/CVE-2021-21225/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21226 page", "url": "https://www.suse.com/security/cve/CVE-2021-21226/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21227 page", "url": "https://www.suse.com/security/cve/CVE-2021-21227/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21228 page", "url": "https://www.suse.com/security/cve/CVE-2021-21228/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21229 page", "url": "https://www.suse.com/security/cve/CVE-2021-21229/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21230 page", "url": "https://www.suse.com/security/cve/CVE-2021-21230/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21231 page", "url": "https://www.suse.com/security/cve/CVE-2021-21231/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21232 page", "url": "https://www.suse.com/security/cve/CVE-2021-21232/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21233 page", "url": "https://www.suse.com/security/cve/CVE-2021-21233/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30506 page", "url": "https://www.suse.com/security/cve/CVE-2021-30506/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30507 page", "url": "https://www.suse.com/security/cve/CVE-2021-30507/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30508 page", "url": "https://www.suse.com/security/cve/CVE-2021-30508/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30509 page", "url": "https://www.suse.com/security/cve/CVE-2021-30509/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30510 page", "url": "https://www.suse.com/security/cve/CVE-2021-30510/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30511 page", "url": "https://www.suse.com/security/cve/CVE-2021-30511/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30512 page", "url": "https://www.suse.com/security/cve/CVE-2021-30512/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30513 page", "url": "https://www.suse.com/security/cve/CVE-2021-30513/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30514 page", "url": "https://www.suse.com/security/cve/CVE-2021-30514/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30515 page", "url": "https://www.suse.com/security/cve/CVE-2021-30515/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30516 page", "url": "https://www.suse.com/security/cve/CVE-2021-30516/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30517 page", "url": "https://www.suse.com/security/cve/CVE-2021-30517/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30518 page", "url": "https://www.suse.com/security/cve/CVE-2021-30518/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30519 page", "url": "https://www.suse.com/security/cve/CVE-2021-30519/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30520 page", "url": "https://www.suse.com/security/cve/CVE-2021-30520/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30521 page", "url": "https://www.suse.com/security/cve/CVE-2021-30521/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30522 page", "url": "https://www.suse.com/security/cve/CVE-2021-30522/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30523 page", "url": "https://www.suse.com/security/cve/CVE-2021-30523/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30524 page", "url": "https://www.suse.com/security/cve/CVE-2021-30524/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30525 page", "url": "https://www.suse.com/security/cve/CVE-2021-30525/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30526 page", "url": "https://www.suse.com/security/cve/CVE-2021-30526/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30527 page", "url": "https://www.suse.com/security/cve/CVE-2021-30527/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30528 page", "url": "https://www.suse.com/security/cve/CVE-2021-30528/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30529 page", "url": "https://www.suse.com/security/cve/CVE-2021-30529/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30530 page", "url": "https://www.suse.com/security/cve/CVE-2021-30530/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30531 page", "url": "https://www.suse.com/security/cve/CVE-2021-30531/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30532 page", "url": "https://www.suse.com/security/cve/CVE-2021-30532/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30533 page", "url": "https://www.suse.com/security/cve/CVE-2021-30533/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30534 page", "url": "https://www.suse.com/security/cve/CVE-2021-30534/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30535 page", "url": "https://www.suse.com/security/cve/CVE-2021-30535/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30536 page", "url": "https://www.suse.com/security/cve/CVE-2021-30536/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30537 page", "url": "https://www.suse.com/security/cve/CVE-2021-30537/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30538 page", "url": "https://www.suse.com/security/cve/CVE-2021-30538/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30539 page", "url": "https://www.suse.com/security/cve/CVE-2021-30539/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30540 page", "url": "https://www.suse.com/security/cve/CVE-2021-30540/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30541 page", "url": "https://www.suse.com/security/cve/CVE-2021-30541/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30544 page", "url": "https://www.suse.com/security/cve/CVE-2021-30544/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30545 page", "url": "https://www.suse.com/security/cve/CVE-2021-30545/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30546 page", "url": "https://www.suse.com/security/cve/CVE-2021-30546/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30547 page", "url": "https://www.suse.com/security/cve/CVE-2021-30547/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30548 page", "url": "https://www.suse.com/security/cve/CVE-2021-30548/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30549 page", "url": "https://www.suse.com/security/cve/CVE-2021-30549/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30550 page", "url": "https://www.suse.com/security/cve/CVE-2021-30550/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30551 page", "url": "https://www.suse.com/security/cve/CVE-2021-30551/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30552 page", "url": "https://www.suse.com/security/cve/CVE-2021-30552/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30553 page", "url": "https://www.suse.com/security/cve/CVE-2021-30553/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30554 page", "url": "https://www.suse.com/security/cve/CVE-2021-30554/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30555 page", "url": "https://www.suse.com/security/cve/CVE-2021-30555/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30556 page", "url": "https://www.suse.com/security/cve/CVE-2021-30556/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30557 page", "url": "https://www.suse.com/security/cve/CVE-2021-30557/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30559 page", "url": "https://www.suse.com/security/cve/CVE-2021-30559/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30560 page", "url": "https://www.suse.com/security/cve/CVE-2021-30560/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30561 page", "url": "https://www.suse.com/security/cve/CVE-2021-30561/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30562 page", "url": "https://www.suse.com/security/cve/CVE-2021-30562/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30563 page", "url": "https://www.suse.com/security/cve/CVE-2021-30563/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30564 page", "url": "https://www.suse.com/security/cve/CVE-2021-30564/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30565 page", "url": "https://www.suse.com/security/cve/CVE-2021-30565/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30566 page", "url": "https://www.suse.com/security/cve/CVE-2021-30566/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30567 page", "url": "https://www.suse.com/security/cve/CVE-2021-30567/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30568 page", "url": "https://www.suse.com/security/cve/CVE-2021-30568/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30569 page", "url": "https://www.suse.com/security/cve/CVE-2021-30569/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30571 page", "url": "https://www.suse.com/security/cve/CVE-2021-30571/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30572 page", "url": "https://www.suse.com/security/cve/CVE-2021-30572/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30573 page", "url": "https://www.suse.com/security/cve/CVE-2021-30573/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30574 page", "url": "https://www.suse.com/security/cve/CVE-2021-30574/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30575 page", "url": "https://www.suse.com/security/cve/CVE-2021-30575/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30576 page", "url": "https://www.suse.com/security/cve/CVE-2021-30576/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30577 page", "url": "https://www.suse.com/security/cve/CVE-2021-30577/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30578 page", "url": "https://www.suse.com/security/cve/CVE-2021-30578/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30579 page", "url": "https://www.suse.com/security/cve/CVE-2021-30579/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30581 page", "url": "https://www.suse.com/security/cve/CVE-2021-30581/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30582 page", "url": "https://www.suse.com/security/cve/CVE-2021-30582/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30584 page", "url": "https://www.suse.com/security/cve/CVE-2021-30584/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30585 page", "url": "https://www.suse.com/security/cve/CVE-2021-30585/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30588 page", "url": "https://www.suse.com/security/cve/CVE-2021-30588/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30589 page", "url": "https://www.suse.com/security/cve/CVE-2021-30589/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30590 page", "url": "https://www.suse.com/security/cve/CVE-2021-30590/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30591 page", "url": "https://www.suse.com/security/cve/CVE-2021-30591/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30592 page", "url": "https://www.suse.com/security/cve/CVE-2021-30592/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30593 page", "url": "https://www.suse.com/security/cve/CVE-2021-30593/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30594 page", "url": "https://www.suse.com/security/cve/CVE-2021-30594/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30596 page", "url": "https://www.suse.com/security/cve/CVE-2021-30596/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30597 page", "url": "https://www.suse.com/security/cve/CVE-2021-30597/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30598 page", "url": "https://www.suse.com/security/cve/CVE-2021-30598/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30599 page", "url": "https://www.suse.com/security/cve/CVE-2021-30599/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30600 page", "url": "https://www.suse.com/security/cve/CVE-2021-30600/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30601 page", "url": "https://www.suse.com/security/cve/CVE-2021-30601/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30602 page", "url": "https://www.suse.com/security/cve/CVE-2021-30602/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30603 page", "url": "https://www.suse.com/security/cve/CVE-2021-30603/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30604 page", "url": "https://www.suse.com/security/cve/CVE-2021-30604/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30606 page", "url": "https://www.suse.com/security/cve/CVE-2021-30606/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30607 page", "url": "https://www.suse.com/security/cve/CVE-2021-30607/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30608 page", "url": "https://www.suse.com/security/cve/CVE-2021-30608/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30609 page", "url": "https://www.suse.com/security/cve/CVE-2021-30609/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30610 page", "url": "https://www.suse.com/security/cve/CVE-2021-30610/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30611 page", "url": "https://www.suse.com/security/cve/CVE-2021-30611/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30612 page", "url": "https://www.suse.com/security/cve/CVE-2021-30612/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30613 page", "url": "https://www.suse.com/security/cve/CVE-2021-30613/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30614 page", "url": "https://www.suse.com/security/cve/CVE-2021-30614/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30615 page", "url": "https://www.suse.com/security/cve/CVE-2021-30615/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30616 page", "url": "https://www.suse.com/security/cve/CVE-2021-30616/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30617 page", "url": "https://www.suse.com/security/cve/CVE-2021-30617/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30618 page", "url": "https://www.suse.com/security/cve/CVE-2021-30618/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30619 page", "url": "https://www.suse.com/security/cve/CVE-2021-30619/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30620 page", "url": "https://www.suse.com/security/cve/CVE-2021-30620/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30621 page", "url": "https://www.suse.com/security/cve/CVE-2021-30621/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30622 page", "url": "https://www.suse.com/security/cve/CVE-2021-30622/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30623 page", "url": "https://www.suse.com/security/cve/CVE-2021-30623/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30624 page", "url": "https://www.suse.com/security/cve/CVE-2021-30624/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30625 page", "url": "https://www.suse.com/security/cve/CVE-2021-30625/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30626 page", "url": "https://www.suse.com/security/cve/CVE-2021-30626/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30627 page", "url": "https://www.suse.com/security/cve/CVE-2021-30627/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30628 page", "url": "https://www.suse.com/security/cve/CVE-2021-30628/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30629 page", "url": "https://www.suse.com/security/cve/CVE-2021-30629/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30630 page", "url": "https://www.suse.com/security/cve/CVE-2021-30630/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30631 page", "url": "https://www.suse.com/security/cve/CVE-2021-30631/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30632 page", "url": "https://www.suse.com/security/cve/CVE-2021-30632/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30633 page", "url": "https://www.suse.com/security/cve/CVE-2021-30633/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37956 page", "url": "https://www.suse.com/security/cve/CVE-2021-37956/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37957 page", "url": "https://www.suse.com/security/cve/CVE-2021-37957/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37958 page", "url": "https://www.suse.com/security/cve/CVE-2021-37958/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37959 page", "url": "https://www.suse.com/security/cve/CVE-2021-37959/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37960 page", "url": "https://www.suse.com/security/cve/CVE-2021-37960/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37961 page", "url": "https://www.suse.com/security/cve/CVE-2021-37961/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37962 page", "url": "https://www.suse.com/security/cve/CVE-2021-37962/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37963 page", "url": "https://www.suse.com/security/cve/CVE-2021-37963/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37964 page", "url": "https://www.suse.com/security/cve/CVE-2021-37964/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37965 page", "url": "https://www.suse.com/security/cve/CVE-2021-37965/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37966 page", "url": "https://www.suse.com/security/cve/CVE-2021-37966/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37967 page", "url": "https://www.suse.com/security/cve/CVE-2021-37967/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37968 page", "url": "https://www.suse.com/security/cve/CVE-2021-37968/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37969 page", "url": "https://www.suse.com/security/cve/CVE-2021-37969/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37970 page", "url": "https://www.suse.com/security/cve/CVE-2021-37970/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37971 page", "url": "https://www.suse.com/security/cve/CVE-2021-37971/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37972 page", "url": "https://www.suse.com/security/cve/CVE-2021-37972/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37973 page", "url": "https://www.suse.com/security/cve/CVE-2021-37973/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37974 page", "url": "https://www.suse.com/security/cve/CVE-2021-37974/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37975 page", "url": "https://www.suse.com/security/cve/CVE-2021-37975/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37976 page", "url": "https://www.suse.com/security/cve/CVE-2021-37976/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37977 page", "url": "https://www.suse.com/security/cve/CVE-2021-37977/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37978 page", "url": "https://www.suse.com/security/cve/CVE-2021-37978/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37979 page", "url": "https://www.suse.com/security/cve/CVE-2021-37979/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37980 page", "url": "https://www.suse.com/security/cve/CVE-2021-37980/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37981 page", "url": "https://www.suse.com/security/cve/CVE-2021-37981/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37982 page", "url": "https://www.suse.com/security/cve/CVE-2021-37982/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37983 page", "url": "https://www.suse.com/security/cve/CVE-2021-37983/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37984 page", "url": "https://www.suse.com/security/cve/CVE-2021-37984/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37985 page", "url": "https://www.suse.com/security/cve/CVE-2021-37985/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37986 page", "url": "https://www.suse.com/security/cve/CVE-2021-37986/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37987 page", "url": "https://www.suse.com/security/cve/CVE-2021-37987/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37988 page", "url": "https://www.suse.com/security/cve/CVE-2021-37988/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37989 page", "url": "https://www.suse.com/security/cve/CVE-2021-37989/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37990 page", "url": "https://www.suse.com/security/cve/CVE-2021-37990/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37991 page", "url": "https://www.suse.com/security/cve/CVE-2021-37991/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37992 page", "url": "https://www.suse.com/security/cve/CVE-2021-37992/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37993 page", "url": "https://www.suse.com/security/cve/CVE-2021-37993/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37994 page", "url": "https://www.suse.com/security/cve/CVE-2021-37994/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37995 page", "url": "https://www.suse.com/security/cve/CVE-2021-37995/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37996 page", "url": "https://www.suse.com/security/cve/CVE-2021-37996/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37997 page", "url": "https://www.suse.com/security/cve/CVE-2021-37997/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37998 page", "url": "https://www.suse.com/security/cve/CVE-2021-37998/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37999 page", "url": "https://www.suse.com/security/cve/CVE-2021-37999/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38000 page", "url": "https://www.suse.com/security/cve/CVE-2021-38000/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38001 page", "url": "https://www.suse.com/security/cve/CVE-2021-38001/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38002 page", "url": "https://www.suse.com/security/cve/CVE-2021-38002/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38003 page", "url": "https://www.suse.com/security/cve/CVE-2021-38003/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38005 page", "url": "https://www.suse.com/security/cve/CVE-2021-38005/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38006 page", "url": "https://www.suse.com/security/cve/CVE-2021-38006/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38007 page", "url": "https://www.suse.com/security/cve/CVE-2021-38007/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38008 page", "url": "https://www.suse.com/security/cve/CVE-2021-38008/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38009 page", "url": "https://www.suse.com/security/cve/CVE-2021-38009/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38010 page", "url": "https://www.suse.com/security/cve/CVE-2021-38010/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38011 page", "url": "https://www.suse.com/security/cve/CVE-2021-38011/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38012 page", "url": "https://www.suse.com/security/cve/CVE-2021-38012/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38013 page", "url": "https://www.suse.com/security/cve/CVE-2021-38013/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38014 page", "url": "https://www.suse.com/security/cve/CVE-2021-38014/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38015 page", "url": "https://www.suse.com/security/cve/CVE-2021-38015/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38016 page", "url": "https://www.suse.com/security/cve/CVE-2021-38016/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38017 page", "url": "https://www.suse.com/security/cve/CVE-2021-38017/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38018 page", "url": "https://www.suse.com/security/cve/CVE-2021-38018/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38019 page", "url": "https://www.suse.com/security/cve/CVE-2021-38019/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38020 page", "url": "https://www.suse.com/security/cve/CVE-2021-38020/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38021 page", "url": "https://www.suse.com/security/cve/CVE-2021-38021/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38022 page", "url": "https://www.suse.com/security/cve/CVE-2021-38022/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4052 page", "url": "https://www.suse.com/security/cve/CVE-2021-4052/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4053 page", "url": "https://www.suse.com/security/cve/CVE-2021-4053/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4054 page", "url": "https://www.suse.com/security/cve/CVE-2021-4054/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4055 page", "url": "https://www.suse.com/security/cve/CVE-2021-4055/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4056 page", "url": "https://www.suse.com/security/cve/CVE-2021-4056/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4057 page", "url": "https://www.suse.com/security/cve/CVE-2021-4057/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4058 page", "url": "https://www.suse.com/security/cve/CVE-2021-4058/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4059 page", "url": "https://www.suse.com/security/cve/CVE-2021-4059/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4061 page", "url": "https://www.suse.com/security/cve/CVE-2021-4061/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4062 page", "url": "https://www.suse.com/security/cve/CVE-2021-4062/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4063 page", "url": "https://www.suse.com/security/cve/CVE-2021-4063/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4064 page", "url": "https://www.suse.com/security/cve/CVE-2021-4064/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4065 page", "url": "https://www.suse.com/security/cve/CVE-2021-4065/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4066 page", "url": "https://www.suse.com/security/cve/CVE-2021-4066/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4067 page", "url": "https://www.suse.com/security/cve/CVE-2021-4067/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4068 page", "url": "https://www.suse.com/security/cve/CVE-2021-4068/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4078 page", "url": "https://www.suse.com/security/cve/CVE-2021-4078/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4079 page", "url": "https://www.suse.com/security/cve/CVE-2021-4079/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4098 page", "url": "https://www.suse.com/security/cve/CVE-2021-4098/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4099 page", "url": "https://www.suse.com/security/cve/CVE-2021-4099/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4100 page", "url": "https://www.suse.com/security/cve/CVE-2021-4100/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4101 page", "url": "https://www.suse.com/security/cve/CVE-2021-4101/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4102 page", "url": "https://www.suse.com/security/cve/CVE-2021-4102/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0096 page", "url": "https://www.suse.com/security/cve/CVE-2022-0096/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0097 page", "url": "https://www.suse.com/security/cve/CVE-2022-0097/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0098 page", "url": "https://www.suse.com/security/cve/CVE-2022-0098/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0099 page", "url": "https://www.suse.com/security/cve/CVE-2022-0099/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0100 page", "url": "https://www.suse.com/security/cve/CVE-2022-0100/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0101 page", "url": "https://www.suse.com/security/cve/CVE-2022-0101/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0102 page", "url": "https://www.suse.com/security/cve/CVE-2022-0102/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0103 page", "url": "https://www.suse.com/security/cve/CVE-2022-0103/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0104 page", "url": "https://www.suse.com/security/cve/CVE-2022-0104/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0105 page", "url": "https://www.suse.com/security/cve/CVE-2022-0105/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0106 page", "url": "https://www.suse.com/security/cve/CVE-2022-0106/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0107 page", "url": "https://www.suse.com/security/cve/CVE-2022-0107/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0108 page", "url": "https://www.suse.com/security/cve/CVE-2022-0108/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0109 page", "url": "https://www.suse.com/security/cve/CVE-2022-0109/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0110 page", "url": "https://www.suse.com/security/cve/CVE-2022-0110/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0111 page", "url": "https://www.suse.com/security/cve/CVE-2022-0111/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0112 page", "url": "https://www.suse.com/security/cve/CVE-2022-0112/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0113 page", "url": "https://www.suse.com/security/cve/CVE-2022-0113/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0114 page", "url": "https://www.suse.com/security/cve/CVE-2022-0114/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0115 page", "url": "https://www.suse.com/security/cve/CVE-2022-0115/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0116 page", "url": "https://www.suse.com/security/cve/CVE-2022-0116/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0117 page", "url": "https://www.suse.com/security/cve/CVE-2022-0117/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0118 page", "url": "https://www.suse.com/security/cve/CVE-2022-0118/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0120 page", "url": "https://www.suse.com/security/cve/CVE-2022-0120/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0289 page", "url": "https://www.suse.com/security/cve/CVE-2022-0289/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0290 page", "url": "https://www.suse.com/security/cve/CVE-2022-0290/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0291 page", "url": "https://www.suse.com/security/cve/CVE-2022-0291/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0292 page", "url": "https://www.suse.com/security/cve/CVE-2022-0292/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0293 page", "url": "https://www.suse.com/security/cve/CVE-2022-0293/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0294 page", "url": "https://www.suse.com/security/cve/CVE-2022-0294/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0295 page", "url": "https://www.suse.com/security/cve/CVE-2022-0295/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0296 page", "url": "https://www.suse.com/security/cve/CVE-2022-0296/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0297 page", "url": "https://www.suse.com/security/cve/CVE-2022-0297/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0298 page", "url": "https://www.suse.com/security/cve/CVE-2022-0298/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0300 page", "url": "https://www.suse.com/security/cve/CVE-2022-0300/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0301 page", "url": "https://www.suse.com/security/cve/CVE-2022-0301/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0302 page", "url": "https://www.suse.com/security/cve/CVE-2022-0302/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0303 page", "url": "https://www.suse.com/security/cve/CVE-2022-0303/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0304 page", "url": "https://www.suse.com/security/cve/CVE-2022-0304/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0305 page", "url": "https://www.suse.com/security/cve/CVE-2022-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0306 page", "url": "https://www.suse.com/security/cve/CVE-2022-0306/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0307 page", "url": "https://www.suse.com/security/cve/CVE-2022-0307/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0308 page", "url": "https://www.suse.com/security/cve/CVE-2022-0308/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0309 page", "url": "https://www.suse.com/security/cve/CVE-2022-0309/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0310 page", "url": "https://www.suse.com/security/cve/CVE-2022-0310/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0311 page", "url": "https://www.suse.com/security/cve/CVE-2022-0311/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0452 page", "url": "https://www.suse.com/security/cve/CVE-2022-0452/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0453 page", "url": "https://www.suse.com/security/cve/CVE-2022-0453/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0454 page", "url": "https://www.suse.com/security/cve/CVE-2022-0454/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0455 page", "url": "https://www.suse.com/security/cve/CVE-2022-0455/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0456 page", "url": "https://www.suse.com/security/cve/CVE-2022-0456/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0457 page", "url": "https://www.suse.com/security/cve/CVE-2022-0457/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0459 page", "url": "https://www.suse.com/security/cve/CVE-2022-0459/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0460 page", "url": "https://www.suse.com/security/cve/CVE-2022-0460/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0461 page", "url": "https://www.suse.com/security/cve/CVE-2022-0461/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0462 page", "url": "https://www.suse.com/security/cve/CVE-2022-0462/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0463 page", "url": "https://www.suse.com/security/cve/CVE-2022-0463/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0464 page", "url": "https://www.suse.com/security/cve/CVE-2022-0464/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0465 page", "url": "https://www.suse.com/security/cve/CVE-2022-0465/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0466 page", "url": "https://www.suse.com/security/cve/CVE-2022-0466/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0467 page", "url": "https://www.suse.com/security/cve/CVE-2022-0467/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0468 page", "url": "https://www.suse.com/security/cve/CVE-2022-0468/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0469 page", "url": "https://www.suse.com/security/cve/CVE-2022-0469/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0470 page", "url": "https://www.suse.com/security/cve/CVE-2022-0470/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0603 page", "url": "https://www.suse.com/security/cve/CVE-2022-0603/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0604 page", "url": "https://www.suse.com/security/cve/CVE-2022-0604/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0605 page", "url": "https://www.suse.com/security/cve/CVE-2022-0605/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0606 page", "url": "https://www.suse.com/security/cve/CVE-2022-0606/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0607 page", "url": "https://www.suse.com/security/cve/CVE-2022-0607/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0608 page", "url": "https://www.suse.com/security/cve/CVE-2022-0608/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0609 page", "url": "https://www.suse.com/security/cve/CVE-2022-0609/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0610 page", "url": "https://www.suse.com/security/cve/CVE-2022-0610/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0789 page", "url": "https://www.suse.com/security/cve/CVE-2022-0789/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0790 page", "url": "https://www.suse.com/security/cve/CVE-2022-0790/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0791 page", "url": "https://www.suse.com/security/cve/CVE-2022-0791/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0792 page", "url": "https://www.suse.com/security/cve/CVE-2022-0792/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0793 page", "url": "https://www.suse.com/security/cve/CVE-2022-0793/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0794 page", "url": "https://www.suse.com/security/cve/CVE-2022-0794/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0795 page", "url": "https://www.suse.com/security/cve/CVE-2022-0795/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0796 page", "url": "https://www.suse.com/security/cve/CVE-2022-0796/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0797 page", "url": "https://www.suse.com/security/cve/CVE-2022-0797/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0798 page", "url": "https://www.suse.com/security/cve/CVE-2022-0798/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0799 page", "url": "https://www.suse.com/security/cve/CVE-2022-0799/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0800 page", "url": "https://www.suse.com/security/cve/CVE-2022-0800/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0801 page", "url": "https://www.suse.com/security/cve/CVE-2022-0801/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0802 page", "url": "https://www.suse.com/security/cve/CVE-2022-0802/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0803 page", "url": "https://www.suse.com/security/cve/CVE-2022-0803/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0804 page", "url": "https://www.suse.com/security/cve/CVE-2022-0804/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0805 page", "url": "https://www.suse.com/security/cve/CVE-2022-0805/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0806 page", "url": "https://www.suse.com/security/cve/CVE-2022-0806/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0807 page", "url": "https://www.suse.com/security/cve/CVE-2022-0807/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0808 page", "url": "https://www.suse.com/security/cve/CVE-2022-0808/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0809 page", "url": "https://www.suse.com/security/cve/CVE-2022-0809/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0971 page", "url": "https://www.suse.com/security/cve/CVE-2022-0971/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0972 page", "url": "https://www.suse.com/security/cve/CVE-2022-0972/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0973 page", "url": "https://www.suse.com/security/cve/CVE-2022-0973/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0974 page", "url": "https://www.suse.com/security/cve/CVE-2022-0974/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0975 page", "url": "https://www.suse.com/security/cve/CVE-2022-0975/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0976 page", "url": "https://www.suse.com/security/cve/CVE-2022-0976/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0977 page", "url": "https://www.suse.com/security/cve/CVE-2022-0977/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0978 page", "url": "https://www.suse.com/security/cve/CVE-2022-0978/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0979 page", "url": "https://www.suse.com/security/cve/CVE-2022-0979/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0980 page", "url": "https://www.suse.com/security/cve/CVE-2022-0980/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1096 page", "url": "https://www.suse.com/security/cve/CVE-2022-1096/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1125 page", "url": "https://www.suse.com/security/cve/CVE-2022-1125/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1127 page", "url": "https://www.suse.com/security/cve/CVE-2022-1127/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1128 page", "url": "https://www.suse.com/security/cve/CVE-2022-1128/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1129 page", "url": "https://www.suse.com/security/cve/CVE-2022-1129/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1130 page", "url": "https://www.suse.com/security/cve/CVE-2022-1130/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1131 page", "url": "https://www.suse.com/security/cve/CVE-2022-1131/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1132 page", "url": "https://www.suse.com/security/cve/CVE-2022-1132/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1133 page", "url": "https://www.suse.com/security/cve/CVE-2022-1133/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1134 page", "url": "https://www.suse.com/security/cve/CVE-2022-1134/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1135 page", "url": "https://www.suse.com/security/cve/CVE-2022-1135/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1136 page", "url": "https://www.suse.com/security/cve/CVE-2022-1136/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1137 page", "url": "https://www.suse.com/security/cve/CVE-2022-1137/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1138 page", "url": "https://www.suse.com/security/cve/CVE-2022-1138/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1139 page", "url": "https://www.suse.com/security/cve/CVE-2022-1139/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1141 page", "url": "https://www.suse.com/security/cve/CVE-2022-1141/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1142 page", "url": "https://www.suse.com/security/cve/CVE-2022-1142/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1143 page", "url": "https://www.suse.com/security/cve/CVE-2022-1143/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1144 page", "url": "https://www.suse.com/security/cve/CVE-2022-1144/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1145 page", "url": "https://www.suse.com/security/cve/CVE-2022-1145/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1146 page", "url": "https://www.suse.com/security/cve/CVE-2022-1146/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1232 page", "url": "https://www.suse.com/security/cve/CVE-2022-1232/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1305 page", "url": "https://www.suse.com/security/cve/CVE-2022-1305/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1306 page", "url": "https://www.suse.com/security/cve/CVE-2022-1306/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1307 page", "url": "https://www.suse.com/security/cve/CVE-2022-1307/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1308 page", "url": "https://www.suse.com/security/cve/CVE-2022-1308/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1309 page", "url": "https://www.suse.com/security/cve/CVE-2022-1309/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1310 page", "url": "https://www.suse.com/security/cve/CVE-2022-1310/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1311 page", "url": "https://www.suse.com/security/cve/CVE-2022-1311/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1312 page", "url": "https://www.suse.com/security/cve/CVE-2022-1312/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1313 page", "url": "https://www.suse.com/security/cve/CVE-2022-1313/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1314 page", "url": "https://www.suse.com/security/cve/CVE-2022-1314/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1364 page", "url": "https://www.suse.com/security/cve/CVE-2022-1364/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1477 page", "url": "https://www.suse.com/security/cve/CVE-2022-1477/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1478 page", "url": "https://www.suse.com/security/cve/CVE-2022-1478/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1479 page", "url": "https://www.suse.com/security/cve/CVE-2022-1479/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1480 page", "url": "https://www.suse.com/security/cve/CVE-2022-1480/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1481 page", "url": "https://www.suse.com/security/cve/CVE-2022-1481/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1482 page", "url": "https://www.suse.com/security/cve/CVE-2022-1482/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1483 page", "url": "https://www.suse.com/security/cve/CVE-2022-1483/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1484 page", "url": "https://www.suse.com/security/cve/CVE-2022-1484/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1485 page", "url": "https://www.suse.com/security/cve/CVE-2022-1485/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1486 page", "url": "https://www.suse.com/security/cve/CVE-2022-1486/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1487 page", "url": "https://www.suse.com/security/cve/CVE-2022-1487/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1488 page", "url": "https://www.suse.com/security/cve/CVE-2022-1488/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1489 page", "url": "https://www.suse.com/security/cve/CVE-2022-1489/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1490 page", "url": "https://www.suse.com/security/cve/CVE-2022-1490/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1491 page", "url": "https://www.suse.com/security/cve/CVE-2022-1491/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1492 page", "url": "https://www.suse.com/security/cve/CVE-2022-1492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1493 page", "url": "https://www.suse.com/security/cve/CVE-2022-1493/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1494 page", "url": "https://www.suse.com/security/cve/CVE-2022-1494/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1495 page", "url": "https://www.suse.com/security/cve/CVE-2022-1495/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1496 page", "url": "https://www.suse.com/security/cve/CVE-2022-1496/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1497 page", "url": "https://www.suse.com/security/cve/CVE-2022-1497/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1498 page", "url": "https://www.suse.com/security/cve/CVE-2022-1498/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1499 page", "url": "https://www.suse.com/security/cve/CVE-2022-1499/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1500 page", "url": "https://www.suse.com/security/cve/CVE-2022-1500/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1501 page", "url": "https://www.suse.com/security/cve/CVE-2022-1501/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1633 page", "url": "https://www.suse.com/security/cve/CVE-2022-1633/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1634 page", "url": "https://www.suse.com/security/cve/CVE-2022-1634/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1635 page", "url": "https://www.suse.com/security/cve/CVE-2022-1635/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1636 page", "url": "https://www.suse.com/security/cve/CVE-2022-1636/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1637 page", "url": "https://www.suse.com/security/cve/CVE-2022-1637/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1638 page", "url": "https://www.suse.com/security/cve/CVE-2022-1638/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1639 page", "url": "https://www.suse.com/security/cve/CVE-2022-1639/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1640 page", "url": "https://www.suse.com/security/cve/CVE-2022-1640/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1641 page", "url": "https://www.suse.com/security/cve/CVE-2022-1641/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1853 page", "url": "https://www.suse.com/security/cve/CVE-2022-1853/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1854 page", "url": "https://www.suse.com/security/cve/CVE-2022-1854/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1855 page", "url": "https://www.suse.com/security/cve/CVE-2022-1855/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1856 page", "url": "https://www.suse.com/security/cve/CVE-2022-1856/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1857 page", "url": "https://www.suse.com/security/cve/CVE-2022-1857/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1858 page", "url": "https://www.suse.com/security/cve/CVE-2022-1858/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1859 page", "url": "https://www.suse.com/security/cve/CVE-2022-1859/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1860 page", "url": "https://www.suse.com/security/cve/CVE-2022-1860/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1861 page", "url": "https://www.suse.com/security/cve/CVE-2022-1861/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1862 page", "url": "https://www.suse.com/security/cve/CVE-2022-1862/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1863 page", "url": "https://www.suse.com/security/cve/CVE-2022-1863/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1864 page", "url": "https://www.suse.com/security/cve/CVE-2022-1864/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1865 page", "url": "https://www.suse.com/security/cve/CVE-2022-1865/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1866 page", "url": "https://www.suse.com/security/cve/CVE-2022-1866/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1867 page", "url": "https://www.suse.com/security/cve/CVE-2022-1867/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1868 page", "url": "https://www.suse.com/security/cve/CVE-2022-1868/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1869 page", "url": "https://www.suse.com/security/cve/CVE-2022-1869/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1870 page", "url": "https://www.suse.com/security/cve/CVE-2022-1870/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1871 page", "url": "https://www.suse.com/security/cve/CVE-2022-1871/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1872 page", "url": "https://www.suse.com/security/cve/CVE-2022-1872/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1873 page", "url": "https://www.suse.com/security/cve/CVE-2022-1873/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1874 page", "url": "https://www.suse.com/security/cve/CVE-2022-1874/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1875 page", "url": "https://www.suse.com/security/cve/CVE-2022-1875/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1876 page", "url": "https://www.suse.com/security/cve/CVE-2022-1876/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2007 page", "url": "https://www.suse.com/security/cve/CVE-2022-2007/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2008 page", "url": "https://www.suse.com/security/cve/CVE-2022-2008/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2010 page", "url": "https://www.suse.com/security/cve/CVE-2022-2010/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2011 page", "url": "https://www.suse.com/security/cve/CVE-2022-2011/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2156 page", "url": "https://www.suse.com/security/cve/CVE-2022-2156/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2157 page", "url": "https://www.suse.com/security/cve/CVE-2022-2157/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2158 page", "url": "https://www.suse.com/security/cve/CVE-2022-2158/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2160 page", "url": "https://www.suse.com/security/cve/CVE-2022-2160/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2161 page", "url": "https://www.suse.com/security/cve/CVE-2022-2161/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2162 page", "url": "https://www.suse.com/security/cve/CVE-2022-2162/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2163 page", "url": "https://www.suse.com/security/cve/CVE-2022-2163/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2164 page", "url": "https://www.suse.com/security/cve/CVE-2022-2164/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2165 page", "url": "https://www.suse.com/security/cve/CVE-2022-2165/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2294 page", "url": "https://www.suse.com/security/cve/CVE-2022-2294/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2295 page", "url": "https://www.suse.com/security/cve/CVE-2022-2295/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2296 page", "url": "https://www.suse.com/security/cve/CVE-2022-2296/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2477 page", "url": "https://www.suse.com/security/cve/CVE-2022-2477/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2478 page", "url": "https://www.suse.com/security/cve/CVE-2022-2478/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2479 page", "url": "https://www.suse.com/security/cve/CVE-2022-2479/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2480 page", "url": "https://www.suse.com/security/cve/CVE-2022-2480/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2481 page", "url": "https://www.suse.com/security/cve/CVE-2022-2481/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2603 page", "url": "https://www.suse.com/security/cve/CVE-2022-2603/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2604 page", "url": "https://www.suse.com/security/cve/CVE-2022-2604/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2605 page", "url": "https://www.suse.com/security/cve/CVE-2022-2605/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2606 page", "url": "https://www.suse.com/security/cve/CVE-2022-2606/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2607 page", "url": "https://www.suse.com/security/cve/CVE-2022-2607/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2608 page", "url": "https://www.suse.com/security/cve/CVE-2022-2608/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2609 page", "url": "https://www.suse.com/security/cve/CVE-2022-2609/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2610 page", "url": "https://www.suse.com/security/cve/CVE-2022-2610/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2611 page", "url": "https://www.suse.com/security/cve/CVE-2022-2611/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2612 page", "url": "https://www.suse.com/security/cve/CVE-2022-2612/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2613 page", "url": "https://www.suse.com/security/cve/CVE-2022-2613/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2614 page", "url": "https://www.suse.com/security/cve/CVE-2022-2614/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2615 page", "url": "https://www.suse.com/security/cve/CVE-2022-2615/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2616 page", "url": "https://www.suse.com/security/cve/CVE-2022-2616/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2617 page", "url": "https://www.suse.com/security/cve/CVE-2022-2617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2618 page", "url": "https://www.suse.com/security/cve/CVE-2022-2618/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2619 page", "url": "https://www.suse.com/security/cve/CVE-2022-2619/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2620 page", "url": "https://www.suse.com/security/cve/CVE-2022-2620/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2621 page", "url": "https://www.suse.com/security/cve/CVE-2022-2621/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2622 page", "url": "https://www.suse.com/security/cve/CVE-2022-2622/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2623 page", "url": "https://www.suse.com/security/cve/CVE-2022-2623/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2624 page", "url": "https://www.suse.com/security/cve/CVE-2022-2624/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2852 page", "url": "https://www.suse.com/security/cve/CVE-2022-2852/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2853 page", "url": "https://www.suse.com/security/cve/CVE-2022-2853/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2854 page", "url": "https://www.suse.com/security/cve/CVE-2022-2854/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2855 page", "url": "https://www.suse.com/security/cve/CVE-2022-2855/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2856 page", "url": "https://www.suse.com/security/cve/CVE-2022-2856/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2857 page", "url": "https://www.suse.com/security/cve/CVE-2022-2857/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2858 page", "url": "https://www.suse.com/security/cve/CVE-2022-2858/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2859 page", "url": "https://www.suse.com/security/cve/CVE-2022-2859/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2860 page", "url": "https://www.suse.com/security/cve/CVE-2022-2860/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2861 page", "url": "https://www.suse.com/security/cve/CVE-2022-2861/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3038 page", "url": "https://www.suse.com/security/cve/CVE-2022-3038/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3039 page", "url": "https://www.suse.com/security/cve/CVE-2022-3039/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3040 page", "url": "https://www.suse.com/security/cve/CVE-2022-3040/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3041 page", "url": "https://www.suse.com/security/cve/CVE-2022-3041/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3042 page", "url": "https://www.suse.com/security/cve/CVE-2022-3042/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3043 page", "url": "https://www.suse.com/security/cve/CVE-2022-3043/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3044 page", "url": "https://www.suse.com/security/cve/CVE-2022-3044/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3045 page", "url": "https://www.suse.com/security/cve/CVE-2022-3045/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3046 page", "url": "https://www.suse.com/security/cve/CVE-2022-3046/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3047 page", "url": "https://www.suse.com/security/cve/CVE-2022-3047/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3048 page", "url": "https://www.suse.com/security/cve/CVE-2022-3048/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3049 page", "url": "https://www.suse.com/security/cve/CVE-2022-3049/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3050 page", "url": "https://www.suse.com/security/cve/CVE-2022-3050/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3051 page", "url": "https://www.suse.com/security/cve/CVE-2022-3051/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3052 page", "url": "https://www.suse.com/security/cve/CVE-2022-3052/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3053 page", "url": "https://www.suse.com/security/cve/CVE-2022-3053/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3054 page", "url": "https://www.suse.com/security/cve/CVE-2022-3054/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3055 page", "url": "https://www.suse.com/security/cve/CVE-2022-3055/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3056 page", "url": "https://www.suse.com/security/cve/CVE-2022-3056/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3057 page", "url": "https://www.suse.com/security/cve/CVE-2022-3057/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3058 page", "url": "https://www.suse.com/security/cve/CVE-2022-3058/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3071 page", "url": "https://www.suse.com/security/cve/CVE-2022-3071/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3075 page", "url": "https://www.suse.com/security/cve/CVE-2022-3075/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3195 page", "url": "https://www.suse.com/security/cve/CVE-2022-3195/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3196 page", "url": "https://www.suse.com/security/cve/CVE-2022-3196/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3197 page", "url": "https://www.suse.com/security/cve/CVE-2022-3197/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3198 page", "url": "https://www.suse.com/security/cve/CVE-2022-3198/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3199 page", "url": "https://www.suse.com/security/cve/CVE-2022-3199/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3200 page", "url": "https://www.suse.com/security/cve/CVE-2022-3200/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3201 page", "url": "https://www.suse.com/security/cve/CVE-2022-3201/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3304 page", "url": "https://www.suse.com/security/cve/CVE-2022-3304/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3305 page", "url": "https://www.suse.com/security/cve/CVE-2022-3305/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3306 page", "url": "https://www.suse.com/security/cve/CVE-2022-3306/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3307 page", "url": "https://www.suse.com/security/cve/CVE-2022-3307/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3308 page", "url": "https://www.suse.com/security/cve/CVE-2022-3308/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3309 page", "url": "https://www.suse.com/security/cve/CVE-2022-3309/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3310 page", "url": "https://www.suse.com/security/cve/CVE-2022-3310/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3311 page", "url": "https://www.suse.com/security/cve/CVE-2022-3311/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3312 page", "url": "https://www.suse.com/security/cve/CVE-2022-3312/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3313 page", "url": "https://www.suse.com/security/cve/CVE-2022-3313/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3314 page", "url": "https://www.suse.com/security/cve/CVE-2022-3314/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3315 page", "url": "https://www.suse.com/security/cve/CVE-2022-3315/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3316 page", "url": "https://www.suse.com/security/cve/CVE-2022-3316/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3317 page", "url": "https://www.suse.com/security/cve/CVE-2022-3317/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3318 page", "url": "https://www.suse.com/security/cve/CVE-2022-3318/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3370 page", "url": "https://www.suse.com/security/cve/CVE-2022-3370/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3373 page", "url": "https://www.suse.com/security/cve/CVE-2022-3373/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3445 page", "url": "https://www.suse.com/security/cve/CVE-2022-3445/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3446 page", "url": "https://www.suse.com/security/cve/CVE-2022-3446/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3447 page", "url": "https://www.suse.com/security/cve/CVE-2022-3447/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3448 page", "url": "https://www.suse.com/security/cve/CVE-2022-3448/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3449 page", "url": "https://www.suse.com/security/cve/CVE-2022-3449/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3450 page", "url": "https://www.suse.com/security/cve/CVE-2022-3450/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3652 page", "url": "https://www.suse.com/security/cve/CVE-2022-3652/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3653 page", "url": "https://www.suse.com/security/cve/CVE-2022-3653/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3654 page", "url": "https://www.suse.com/security/cve/CVE-2022-3654/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3655 page", "url": "https://www.suse.com/security/cve/CVE-2022-3655/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3656 page", "url": "https://www.suse.com/security/cve/CVE-2022-3656/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3657 page", "url": "https://www.suse.com/security/cve/CVE-2022-3657/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3658 page", "url": "https://www.suse.com/security/cve/CVE-2022-3658/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3659 page", "url": "https://www.suse.com/security/cve/CVE-2022-3659/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3660 page", "url": "https://www.suse.com/security/cve/CVE-2022-3660/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3661 page", "url": "https://www.suse.com/security/cve/CVE-2022-3661/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3723 page", "url": "https://www.suse.com/security/cve/CVE-2022-3723/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3885 page", "url": "https://www.suse.com/security/cve/CVE-2022-3885/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3886 page", "url": "https://www.suse.com/security/cve/CVE-2022-3886/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3887 page", "url": "https://www.suse.com/security/cve/CVE-2022-3887/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3888 page", "url": "https://www.suse.com/security/cve/CVE-2022-3888/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3889 page", "url": "https://www.suse.com/security/cve/CVE-2022-3889/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3890 page", "url": "https://www.suse.com/security/cve/CVE-2022-3890/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4135 page", "url": "https://www.suse.com/security/cve/CVE-2022-4135/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4174 page", "url": "https://www.suse.com/security/cve/CVE-2022-4174/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4175 page", "url": "https://www.suse.com/security/cve/CVE-2022-4175/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4176 page", "url": "https://www.suse.com/security/cve/CVE-2022-4176/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4177 page", "url": "https://www.suse.com/security/cve/CVE-2022-4177/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4178 page", "url": "https://www.suse.com/security/cve/CVE-2022-4178/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4179 page", "url": "https://www.suse.com/security/cve/CVE-2022-4179/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4180 page", "url": "https://www.suse.com/security/cve/CVE-2022-4180/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4181 page", "url": "https://www.suse.com/security/cve/CVE-2022-4181/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4182 page", "url": "https://www.suse.com/security/cve/CVE-2022-4182/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4183 page", "url": "https://www.suse.com/security/cve/CVE-2022-4183/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4184 page", "url": "https://www.suse.com/security/cve/CVE-2022-4184/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4185 page", "url": "https://www.suse.com/security/cve/CVE-2022-4185/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4186 page", "url": "https://www.suse.com/security/cve/CVE-2022-4186/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4187 page", "url": "https://www.suse.com/security/cve/CVE-2022-4187/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4188 page", "url": "https://www.suse.com/security/cve/CVE-2022-4188/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4189 page", "url": "https://www.suse.com/security/cve/CVE-2022-4189/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4190 page", "url": "https://www.suse.com/security/cve/CVE-2022-4190/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4191 page", "url": "https://www.suse.com/security/cve/CVE-2022-4191/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4192 page", "url": "https://www.suse.com/security/cve/CVE-2022-4192/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4193 page", "url": "https://www.suse.com/security/cve/CVE-2022-4193/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4194 page", "url": "https://www.suse.com/security/cve/CVE-2022-4194/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4195 page", "url": "https://www.suse.com/security/cve/CVE-2022-4195/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4262 page", "url": "https://www.suse.com/security/cve/CVE-2022-4262/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4436 page", "url": "https://www.suse.com/security/cve/CVE-2022-4436/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4437 page", "url": "https://www.suse.com/security/cve/CVE-2022-4437/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4438 page", "url": "https://www.suse.com/security/cve/CVE-2022-4438/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4439 page", "url": "https://www.suse.com/security/cve/CVE-2022-4439/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4440 page", "url": "https://www.suse.com/security/cve/CVE-2022-4440/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0128 page", "url": "https://www.suse.com/security/cve/CVE-2023-0128/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0129 page", "url": "https://www.suse.com/security/cve/CVE-2023-0129/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0130 page", "url": "https://www.suse.com/security/cve/CVE-2023-0130/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0131 page", "url": "https://www.suse.com/security/cve/CVE-2023-0131/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0132 page", "url": "https://www.suse.com/security/cve/CVE-2023-0132/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0133 page", "url": "https://www.suse.com/security/cve/CVE-2023-0133/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0134 page", "url": "https://www.suse.com/security/cve/CVE-2023-0134/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0135 page", "url": "https://www.suse.com/security/cve/CVE-2023-0135/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0136 page", "url": "https://www.suse.com/security/cve/CVE-2023-0136/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0137 page", "url": "https://www.suse.com/security/cve/CVE-2023-0137/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0138 page", "url": "https://www.suse.com/security/cve/CVE-2023-0138/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0139 page", "url": "https://www.suse.com/security/cve/CVE-2023-0139/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0140 page", "url": "https://www.suse.com/security/cve/CVE-2023-0140/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0141 page", "url": "https://www.suse.com/security/cve/CVE-2023-0141/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0471 page", "url": "https://www.suse.com/security/cve/CVE-2023-0471/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0472 page", "url": "https://www.suse.com/security/cve/CVE-2023-0472/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0473 page", "url": "https://www.suse.com/security/cve/CVE-2023-0473/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0474 page", "url": "https://www.suse.com/security/cve/CVE-2023-0474/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0696 page", "url": "https://www.suse.com/security/cve/CVE-2023-0696/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0697 page", "url": "https://www.suse.com/security/cve/CVE-2023-0697/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0698 page", "url": "https://www.suse.com/security/cve/CVE-2023-0698/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0699 page", "url": "https://www.suse.com/security/cve/CVE-2023-0699/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0700 page", "url": "https://www.suse.com/security/cve/CVE-2023-0700/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0701 page", "url": "https://www.suse.com/security/cve/CVE-2023-0701/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0702 page", "url": "https://www.suse.com/security/cve/CVE-2023-0702/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0703 page", "url": "https://www.suse.com/security/cve/CVE-2023-0703/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0704 page", "url": "https://www.suse.com/security/cve/CVE-2023-0704/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0705 page", "url": "https://www.suse.com/security/cve/CVE-2023-0705/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0927 page", "url": "https://www.suse.com/security/cve/CVE-2023-0927/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0928 page", "url": "https://www.suse.com/security/cve/CVE-2023-0928/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0929 page", "url": "https://www.suse.com/security/cve/CVE-2023-0929/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0930 page", "url": "https://www.suse.com/security/cve/CVE-2023-0930/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0931 page", "url": "https://www.suse.com/security/cve/CVE-2023-0931/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0932 page", "url": "https://www.suse.com/security/cve/CVE-2023-0932/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0933 page", "url": "https://www.suse.com/security/cve/CVE-2023-0933/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0941 page", "url": "https://www.suse.com/security/cve/CVE-2023-0941/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1213 page", "url": "https://www.suse.com/security/cve/CVE-2023-1213/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1214 page", "url": "https://www.suse.com/security/cve/CVE-2023-1214/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1215 page", "url": "https://www.suse.com/security/cve/CVE-2023-1215/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1216 page", "url": "https://www.suse.com/security/cve/CVE-2023-1216/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1217 page", "url": "https://www.suse.com/security/cve/CVE-2023-1217/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1218 page", "url": "https://www.suse.com/security/cve/CVE-2023-1218/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1219 page", "url": "https://www.suse.com/security/cve/CVE-2023-1219/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1220 page", "url": "https://www.suse.com/security/cve/CVE-2023-1220/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1221 page", "url": "https://www.suse.com/security/cve/CVE-2023-1221/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1222 page", "url": "https://www.suse.com/security/cve/CVE-2023-1222/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1223 page", "url": "https://www.suse.com/security/cve/CVE-2023-1223/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1224 page", "url": "https://www.suse.com/security/cve/CVE-2023-1224/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1225 page", "url": "https://www.suse.com/security/cve/CVE-2023-1225/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1226 page", "url": "https://www.suse.com/security/cve/CVE-2023-1226/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1227 page", "url": "https://www.suse.com/security/cve/CVE-2023-1227/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1228 page", "url": "https://www.suse.com/security/cve/CVE-2023-1228/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1229 page", "url": "https://www.suse.com/security/cve/CVE-2023-1229/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1230 page", "url": "https://www.suse.com/security/cve/CVE-2023-1230/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1231 page", "url": "https://www.suse.com/security/cve/CVE-2023-1231/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1232 page", "url": "https://www.suse.com/security/cve/CVE-2023-1232/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1233 page", "url": "https://www.suse.com/security/cve/CVE-2023-1233/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1234 page", "url": "https://www.suse.com/security/cve/CVE-2023-1234/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1235 page", "url": "https://www.suse.com/security/cve/CVE-2023-1235/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1236 page", "url": "https://www.suse.com/security/cve/CVE-2023-1236/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1528 page", "url": "https://www.suse.com/security/cve/CVE-2023-1528/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1529 page", "url": "https://www.suse.com/security/cve/CVE-2023-1529/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1530 page", "url": "https://www.suse.com/security/cve/CVE-2023-1530/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1531 page", "url": "https://www.suse.com/security/cve/CVE-2023-1531/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1532 page", "url": "https://www.suse.com/security/cve/CVE-2023-1532/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1533 page", "url": "https://www.suse.com/security/cve/CVE-2023-1533/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1534 page", "url": "https://www.suse.com/security/cve/CVE-2023-1534/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1810 page", "url": "https://www.suse.com/security/cve/CVE-2023-1810/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1811 page", "url": "https://www.suse.com/security/cve/CVE-2023-1811/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1812 page", "url": "https://www.suse.com/security/cve/CVE-2023-1812/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1813 page", "url": "https://www.suse.com/security/cve/CVE-2023-1813/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1814 page", "url": "https://www.suse.com/security/cve/CVE-2023-1814/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1815 page", "url": "https://www.suse.com/security/cve/CVE-2023-1815/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1816 page", "url": "https://www.suse.com/security/cve/CVE-2023-1816/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1817 page", "url": "https://www.suse.com/security/cve/CVE-2023-1817/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1818 page", "url": "https://www.suse.com/security/cve/CVE-2023-1818/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1819 page", "url": "https://www.suse.com/security/cve/CVE-2023-1819/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1820 page", "url": "https://www.suse.com/security/cve/CVE-2023-1820/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1821 page", "url": "https://www.suse.com/security/cve/CVE-2023-1821/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1822 page", "url": "https://www.suse.com/security/cve/CVE-2023-1822/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1823 page", "url": "https://www.suse.com/security/cve/CVE-2023-1823/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2033 page", "url": "https://www.suse.com/security/cve/CVE-2023-2033/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2133 page", "url": "https://www.suse.com/security/cve/CVE-2023-2133/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2134 page", "url": "https://www.suse.com/security/cve/CVE-2023-2134/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2135 page", "url": "https://www.suse.com/security/cve/CVE-2023-2135/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2136 page", "url": "https://www.suse.com/security/cve/CVE-2023-2136/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2137 page", "url": "https://www.suse.com/security/cve/CVE-2023-2137/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2459 page", "url": "https://www.suse.com/security/cve/CVE-2023-2459/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2460 page", "url": "https://www.suse.com/security/cve/CVE-2023-2460/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2461 page", "url": "https://www.suse.com/security/cve/CVE-2023-2461/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2462 page", "url": "https://www.suse.com/security/cve/CVE-2023-2462/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2463 page", "url": "https://www.suse.com/security/cve/CVE-2023-2463/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2464 page", "url": "https://www.suse.com/security/cve/CVE-2023-2464/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2465 page", "url": "https://www.suse.com/security/cve/CVE-2023-2465/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2466 page", "url": "https://www.suse.com/security/cve/CVE-2023-2466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2467 page", "url": "https://www.suse.com/security/cve/CVE-2023-2467/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2468 page", "url": "https://www.suse.com/security/cve/CVE-2023-2468/" } ], "title": "ungoogled-chromium-113.0.5672.92-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:12948-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ungoogled-chromium-113.0.5672.92-1.1.aarch64", "product": { "name": "ungoogled-chromium-113.0.5672.92-1.1.aarch64", "product_id": "ungoogled-chromium-113.0.5672.92-1.1.aarch64" } }, { "category": "product_version", "name": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "product": { "name": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "product_id": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "product": { "name": "ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "product_id": "ungoogled-chromium-113.0.5672.92-1.1.ppc64le" } }, { "category": "product_version", "name": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "product": { "name": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "product_id": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ungoogled-chromium-113.0.5672.92-1.1.s390x", "product": { "name": "ungoogled-chromium-113.0.5672.92-1.1.s390x", "product_id": "ungoogled-chromium-113.0.5672.92-1.1.s390x" } }, { "category": "product_version", "name": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "product": { "name": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "product_id": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ungoogled-chromium-113.0.5672.92-1.1.x86_64", "product": { "name": "ungoogled-chromium-113.0.5672.92-1.1.x86_64", "product_id": "ungoogled-chromium-113.0.5672.92-1.1.x86_64" } }, { "category": "product_version", "name": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64", "product": { "name": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64", "product_id": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ungoogled-chromium-113.0.5672.92-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64" }, "product_reference": "ungoogled-chromium-113.0.5672.92-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ungoogled-chromium-113.0.5672.92-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le" }, "product_reference": "ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ungoogled-chromium-113.0.5672.92-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x" }, "product_reference": "ungoogled-chromium-113.0.5672.92-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ungoogled-chromium-113.0.5672.92-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64" }, "product_reference": "ungoogled-chromium-113.0.5672.92-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64" }, "product_reference": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le" }, "product_reference": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x" }, "product_reference": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" }, "product_reference": "ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3015", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3015" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the PDF codecs in Google Chrome before 17.0.963.56 allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3015", "url": "https://www.suse.com/security/cve/CVE-2011-3015" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3015", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3015" }, { "cve": "CVE-2011-3016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3016" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving counter nodes, related to a \"read-after-free\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3016", "url": "https://www.suse.com/security/cve/CVE-2011-3016" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3016", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3016" }, { "cve": "CVE-2011-3017", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3017" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to database handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3017", "url": "https://www.suse.com/security/cve/CVE-2011-3017" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3017", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3017" }, { "cve": "CVE-2011-3018", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3018" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to path rendering.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3018", "url": "https://www.suse.com/security/cve/CVE-2011-3018" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3018", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3018" }, { "cve": "CVE-2011-3019", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3019" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Matroska video (aka MKV) file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3019", "url": "https://www.suse.com/security/cve/CVE-2011-3019" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3019", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3019" }, { "cve": "CVE-2011-3020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3020" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in the Native Client validator implementation in Google Chrome before 17.0.963.56 has unknown impact and remote attack vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3020", "url": "https://www.suse.com/security/cve/CVE-2011-3020" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3020", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3020" }, { "cve": "CVE-2011-3021", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3021" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to subframe loading.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3021", "url": "https://www.suse.com/security/cve/CVE-2011-3021" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3021", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3021" }, { "cve": "CVE-2011-3022", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3022" } ], "notes": [ { "category": "general", "text": "translate/translate_manager.cc in Google Chrome before 17.0.963.56 and 19.x before 19.0.1036.7 uses an HTTP session to exchange data for translation, which allows remote attackers to obtain sensitive information by sniffing the network.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3022", "url": "https://www.suse.com/security/cve/CVE-2011-3022" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3022", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3022" }, { "cve": "CVE-2011-3023", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3023" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 17.0.963.56 allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to drag-and-drop operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3023", "url": "https://www.suse.com/security/cve/CVE-2011-3023" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3023", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3023" }, { "cve": "CVE-2011-3024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3024" } ], "notes": [ { "category": "general", "text": "Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service (application crash) via an empty X.509 certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3024", "url": "https://www.suse.com/security/cve/CVE-2011-3024" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3024", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3024" }, { "cve": "CVE-2011-3025", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3025" } ], "notes": [ { "category": "general", "text": "Google Chrome before 17.0.963.56 does not properly parse H.264 data, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3025", "url": "https://www.suse.com/security/cve/CVE-2011-3025" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3025", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3025" }, { "cve": "CVE-2011-3026", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3026" } ], "notes": [ { "category": "general", "text": "Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3026", "url": "https://www.suse.com/security/cve/CVE-2011-3026" }, { "category": "external", "summary": "SUSE Bug 747311 for CVE-2011-3026", "url": "https://bugzilla.suse.com/747311" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3026", "url": "https://bugzilla.suse.com/747327" }, { "category": "external", "summary": "SUSE Bug 747328 for CVE-2011-3026", "url": "https://bugzilla.suse.com/747328" }, { "category": "external", "summary": "SUSE Bug 773612 for CVE-2011-3026", "url": "https://bugzilla.suse.com/773612" }, { "category": "external", "summary": "SUSE Bug 854395 for CVE-2011-3026", "url": "https://bugzilla.suse.com/854395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3026" }, { "cve": "CVE-2011-3027", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3027" } ], "notes": [ { "category": "general", "text": "Google Chrome before 17.0.963.56 does not properly perform a cast of an unspecified variable during handling of columns, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3027", "url": "https://www.suse.com/security/cve/CVE-2011-3027" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3027", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3027" }, { "cve": "CVE-2011-3031", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3031" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the element wrapper in Google V8, as used in Google Chrome before 17.0.963.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3031", "url": "https://www.suse.com/security/cve/CVE-2011-3031" }, { "category": "external", "summary": "SUSE Bug 750407 for CVE-2011-3031", "url": "https://bugzilla.suse.com/750407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3031" }, { "cve": "CVE-2011-3032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3032" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of SVG values.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3032", "url": "https://www.suse.com/security/cve/CVE-2011-3032" }, { "category": "external", "summary": "SUSE Bug 750407 for CVE-2011-3032", "url": "https://bugzilla.suse.com/750407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3032" }, { "cve": "CVE-2011-3033", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3033" } ], "notes": [ { "category": "general", "text": "Buffer overflow in Skia, as used in Google Chrome before 17.0.963.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3033", "url": "https://www.suse.com/security/cve/CVE-2011-3033" }, { "category": "external", "summary": "SUSE Bug 750407 for CVE-2011-3033", "url": "https://bugzilla.suse.com/750407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3033" }, { "cve": "CVE-2011-3034", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3034" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving an SVG document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3034", "url": "https://www.suse.com/security/cve/CVE-2011-3034" }, { "category": "external", "summary": "SUSE Bug 750407 for CVE-2011-3034", "url": "https://bugzilla.suse.com/750407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3034" }, { "cve": "CVE-2011-3035", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3035" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving SVG use elements.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3035", "url": "https://www.suse.com/security/cve/CVE-2011-3035" }, { "category": "external", "summary": "SUSE Bug 750407 for CVE-2011-3035", "url": "https://bugzilla.suse.com/750407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3035" }, { "cve": "CVE-2011-3036", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3036" } ], "notes": [ { "category": "general", "text": "Google Chrome before 17.0.963.65 does not properly perform a cast of an unspecified variable during handling of line boxes, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3036", "url": "https://www.suse.com/security/cve/CVE-2011-3036" }, { "category": "external", "summary": "SUSE Bug 750407 for CVE-2011-3036", "url": "https://bugzilla.suse.com/750407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3036" }, { "cve": "CVE-2011-3037", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3037" } ], "notes": [ { "category": "general", "text": "Google Chrome before 17.0.963.65 does not properly perform casts of unspecified variables during the splitting of anonymous blocks, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3037", "url": "https://www.suse.com/security/cve/CVE-2011-3037" }, { "category": "external", "summary": "SUSE Bug 750407 for CVE-2011-3037", "url": "https://bugzilla.suse.com/750407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3037" }, { "cve": "CVE-2011-3038", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3038" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to multi-column handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3038", "url": "https://www.suse.com/security/cve/CVE-2011-3038" }, { "category": "external", "summary": "SUSE Bug 750407 for CVE-2011-3038", "url": "https://bugzilla.suse.com/750407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3038" }, { "cve": "CVE-2011-3039", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3039" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to quote handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3039", "url": "https://www.suse.com/security/cve/CVE-2011-3039" }, { "category": "external", "summary": "SUSE Bug 750407 for CVE-2011-3039", "url": "https://bugzilla.suse.com/750407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3039" }, { "cve": "CVE-2011-3040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3040" } ], "notes": [ { "category": "general", "text": "Google Chrome before 17.0.963.65 does not properly handle text, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3040", "url": "https://www.suse.com/security/cve/CVE-2011-3040" }, { "category": "external", "summary": "SUSE Bug 750407 for CVE-2011-3040", "url": "https://bugzilla.suse.com/750407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3040" }, { "cve": "CVE-2011-3041", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3041" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of class attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3041", "url": "https://www.suse.com/security/cve/CVE-2011-3041" }, { "category": "external", "summary": "SUSE Bug 750407 for CVE-2011-3041", "url": "https://bugzilla.suse.com/750407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3041" }, { "cve": "CVE-2011-3042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3042" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of table sections.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3042", "url": "https://www.suse.com/security/cve/CVE-2011-3042" }, { "category": "external", "summary": "SUSE Bug 750407 for CVE-2011-3042", "url": "https://bugzilla.suse.com/750407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3042" }, { "cve": "CVE-2011-3043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3043" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a flexbox (aka flexible box) in conjunction with the floating of elements.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3043", "url": "https://www.suse.com/security/cve/CVE-2011-3043" }, { "category": "external", "summary": "SUSE Bug 750407 for CVE-2011-3043", "url": "https://bugzilla.suse.com/750407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3043" }, { "cve": "CVE-2011-3044", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3044" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving SVG animation elements.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3044", "url": "https://www.suse.com/security/cve/CVE-2011-3044" }, { "category": "external", "summary": "SUSE Bug 750407 for CVE-2011-3044", "url": "https://bugzilla.suse.com/750407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3044" }, { "cve": "CVE-2011-3045", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3045" } ], "notes": [ { "category": "general", "text": "Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3045", "url": "https://www.suse.com/security/cve/CVE-2011-3045" }, { "category": "external", "summary": "SUSE Bug 752008 for CVE-2011-3045", "url": "https://bugzilla.suse.com/752008" }, { "category": "external", "summary": "SUSE Bug 754456 for CVE-2011-3045", "url": "https://bugzilla.suse.com/754456" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3045" }, { "cve": "CVE-2011-3046", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3046" } ], "notes": [ { "category": "general", "text": "The extension subsystem in Google Chrome before 17.0.963.78 does not properly handle history navigation, which allows remote attackers to execute arbitrary code by leveraging a \"Universal XSS (UXSS)\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3046", "url": "https://www.suse.com/security/cve/CVE-2011-3046" }, { "category": "external", "summary": "SUSE Bug 751466 for CVE-2011-3046", "url": "https://bugzilla.suse.com/751466" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-3046" }, { "cve": "CVE-2011-3047", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3047" } ], "notes": [ { "category": "general", "text": "The GPU process in Google Chrome before 17.0.963.79 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) by leveraging an error in the plug-in loading mechanism.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3047", "url": "https://www.suse.com/security/cve/CVE-2011-3047" }, { "category": "external", "summary": "SUSE Bug 751738 for CVE-2011-3047", "url": "https://bugzilla.suse.com/751738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-3047" }, { "cve": "CVE-2011-3049", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3049" } ], "notes": [ { "category": "general", "text": "Google Chrome before 17.0.963.83 does not properly restrict the extension web request API, which allows remote attackers to cause a denial of service (disrupted system requests) via a crafted extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3049", "url": "https://www.suse.com/security/cve/CVE-2011-3049" }, { "category": "external", "summary": "SUSE Bug 754456 for CVE-2011-3049", "url": "https://bugzilla.suse.com/754456" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3049" }, { "cve": "CVE-2011-3050", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3050" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 17.0.963.83 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3050", "url": "https://www.suse.com/security/cve/CVE-2011-3050" }, { "category": "external", "summary": "SUSE Bug 754456 for CVE-2011-3050", "url": "https://bugzilla.suse.com/754456" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3050" }, { "cve": "CVE-2011-3051", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3051" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 17.0.963.83 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the cross-fade function.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3051", "url": "https://www.suse.com/security/cve/CVE-2011-3051" }, { "category": "external", "summary": "SUSE Bug 754456 for CVE-2011-3051", "url": "https://bugzilla.suse.com/754456" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3051" }, { "cve": "CVE-2011-3052", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3052" } ], "notes": [ { "category": "general", "text": "The WebGL implementation in Google Chrome before 17.0.963.83 does not properly handle CANVAS elements, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3052", "url": "https://www.suse.com/security/cve/CVE-2011-3052" }, { "category": "external", "summary": "SUSE Bug 754456 for CVE-2011-3052", "url": "https://bugzilla.suse.com/754456" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3052" }, { "cve": "CVE-2011-3053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3053" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 17.0.963.83 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to block splitting.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3053", "url": "https://www.suse.com/security/cve/CVE-2011-3053" }, { "category": "external", "summary": "SUSE Bug 754456 for CVE-2011-3053", "url": "https://bugzilla.suse.com/754456" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3053" }, { "cve": "CVE-2011-3054", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3054" } ], "notes": [ { "category": "general", "text": "The WebUI privilege implementation in Google Chrome before 17.0.963.83 does not properly perform isolation, which allows remote attackers to bypass intended access restrictions via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3054", "url": "https://www.suse.com/security/cve/CVE-2011-3054" }, { "category": "external", "summary": "SUSE Bug 754456 for CVE-2011-3054", "url": "https://bugzilla.suse.com/754456" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3054" }, { "cve": "CVE-2011-3055", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3055" } ], "notes": [ { "category": "general", "text": "The browser native UI in Google Chrome before 17.0.963.83 does not require user confirmation before an unpacked extension installation, which allows user-assisted remote attackers to have an unspecified impact via a crafted extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3055", "url": "https://www.suse.com/security/cve/CVE-2011-3055" }, { "category": "external", "summary": "SUSE Bug 754456 for CVE-2011-3055", "url": "https://bugzilla.suse.com/754456" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3055" }, { "cve": "CVE-2011-3056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3056" } ], "notes": [ { "category": "general", "text": "Google Chrome before 17.0.963.83 allows remote attackers to bypass the Same Origin Policy via vectors involving a \"magic iframe.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3056", "url": "https://www.suse.com/security/cve/CVE-2011-3056" }, { "category": "external", "summary": "SUSE Bug 754456 for CVE-2011-3056", "url": "https://bugzilla.suse.com/754456" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3056" }, { "cve": "CVE-2011-3057", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3057" } ], "notes": [ { "category": "general", "text": "Google V8, as used in Google Chrome before 17.0.963.83, allows remote attackers to cause a denial of service via vectors that trigger an invalid read operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3057", "url": "https://www.suse.com/security/cve/CVE-2011-3057" }, { "category": "external", "summary": "SUSE Bug 754456 for CVE-2011-3057", "url": "https://bugzilla.suse.com/754456" }, { "category": "external", "summary": "SUSE Bug 754458 for CVE-2011-3057", "url": "https://bugzilla.suse.com/754458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3057" }, { "cve": "CVE-2011-3058", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3058" } ], "notes": [ { "category": "general", "text": "Google Chrome before 18.0.1025.142 does not properly handle the EUC-JP encoding system, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3058", "url": "https://www.suse.com/security/cve/CVE-2011-3058" }, { "category": "external", "summary": "SUSE Bug 754458 for CVE-2011-3058", "url": "https://bugzilla.suse.com/754458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3058" }, { "cve": "CVE-2011-3059", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3059" } ], "notes": [ { "category": "general", "text": "Google Chrome before 18.0.1025.142 does not properly handle SVG text elements, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3059", "url": "https://www.suse.com/security/cve/CVE-2011-3059" }, { "category": "external", "summary": "SUSE Bug 754458 for CVE-2011-3059", "url": "https://bugzilla.suse.com/754458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3059" }, { "cve": "CVE-2011-3060", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3060" } ], "notes": [ { "category": "general", "text": "Google Chrome before 18.0.1025.142 does not properly handle text fragments, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3060", "url": "https://www.suse.com/security/cve/CVE-2011-3060" }, { "category": "external", "summary": "SUSE Bug 754458 for CVE-2011-3060", "url": "https://bugzilla.suse.com/754458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3060" }, { "cve": "CVE-2011-3061", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3061" } ], "notes": [ { "category": "general", "text": "Google Chrome before 18.0.1025.142 does not properly check X.509 certificates before use of a SPDY proxy, which might allow man-in-the-middle attackers to spoof servers or obtain sensitive information via a crafted certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3061", "url": "https://www.suse.com/security/cve/CVE-2011-3061" }, { "category": "external", "summary": "SUSE Bug 754458 for CVE-2011-3061", "url": "https://bugzilla.suse.com/754458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3061" }, { "cve": "CVE-2011-3062", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3062" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the OpenType Sanitizer in Google Chrome before 18.0.1025.142 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted OpenType file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3062", "url": "https://www.suse.com/security/cve/CVE-2011-3062" }, { "category": "external", "summary": "SUSE Bug 754458 for CVE-2011-3062", "url": "https://bugzilla.suse.com/754458" }, { "category": "external", "summary": "SUSE Bug 758408 for CVE-2011-3062", "url": "https://bugzilla.suse.com/758408" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-3062" }, { "cve": "CVE-2011-3063", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3063" } ], "notes": [ { "category": "general", "text": "Google Chrome before 18.0.1025.142 does not properly validate the renderer\u0027s navigation requests, which has unspecified impact and remote attack vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3063", "url": "https://www.suse.com/security/cve/CVE-2011-3063" }, { "category": "external", "summary": "SUSE Bug 754458 for CVE-2011-3063", "url": "https://bugzilla.suse.com/754458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-3063" }, { "cve": "CVE-2011-3064", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3064" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 18.0.1025.142 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG clipping.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3064", "url": "https://www.suse.com/security/cve/CVE-2011-3064" }, { "category": "external", "summary": "SUSE Bug 754458 for CVE-2011-3064", "url": "https://bugzilla.suse.com/754458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3064" }, { "cve": "CVE-2011-3065", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3065" } ], "notes": [ { "category": "general", "text": "Skia, as used in Google Chrome before 18.0.1025.142, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3065", "url": "https://www.suse.com/security/cve/CVE-2011-3065" }, { "category": "external", "summary": "SUSE Bug 754458 for CVE-2011-3065", "url": "https://bugzilla.suse.com/754458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3065" }, { "cve": "CVE-2011-3066", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3066" } ], "notes": [ { "category": "general", "text": "Skia, as used in Google Chrome before 18.0.1025.151, does not properly perform clipping, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3066", "url": "https://www.suse.com/security/cve/CVE-2011-3066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3066" }, { "cve": "CVE-2011-3067", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3067" } ], "notes": [ { "category": "general", "text": "Google Chrome before 18.0.1025.151 allows remote attackers to bypass the Same Origin Policy via vectors related to replacement of IFRAME elements.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3067", "url": "https://www.suse.com/security/cve/CVE-2011-3067" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3067" }, { "cve": "CVE-2011-3068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3068" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to run-in boxes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3068", "url": "https://www.suse.com/security/cve/CVE-2011-3068" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3068" }, { "cve": "CVE-2011-3069", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3069" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to line boxes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3069", "url": "https://www.suse.com/security/cve/CVE-2011-3069" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3069" }, { "cve": "CVE-2011-3070", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3070" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the Google V8 bindings.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3070", "url": "https://www.suse.com/security/cve/CVE-2011-3070" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3070" }, { "cve": "CVE-2011-3071", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3071" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the HTMLMediaElement implementation in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3071", "url": "https://www.suse.com/security/cve/CVE-2011-3071" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3071" }, { "cve": "CVE-2011-3072", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3072" } ], "notes": [ { "category": "general", "text": "Google Chrome before 18.0.1025.151 allows remote attackers to bypass the Same Origin Policy via vectors related to pop-up windows.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3072", "url": "https://www.suse.com/security/cve/CVE-2011-3072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3072" }, { "cve": "CVE-2011-3073", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3073" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of SVG resources.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3073", "url": "https://www.suse.com/security/cve/CVE-2011-3073" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3073" }, { "cve": "CVE-2011-3074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3074" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of media.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3074", "url": "https://www.suse.com/security/cve/CVE-2011-3074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3074" }, { "cve": "CVE-2011-3075", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3075" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to style-application commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3075", "url": "https://www.suse.com/security/cve/CVE-2011-3075" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3075" }, { "cve": "CVE-2011-3076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3076" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to focus handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3076", "url": "https://www.suse.com/security/cve/CVE-2011-3076" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3076" }, { "cve": "CVE-2011-3077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3077" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the script bindings, related to a \"read-after-free\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3077", "url": "https://www.suse.com/security/cve/CVE-2011-3077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3077" }, { "cve": "CVE-2011-3078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3078" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 18.0.1025.168 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the floating of elements, a different vulnerability than CVE-2011-3081.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3078", "url": "https://www.suse.com/security/cve/CVE-2011-3078" }, { "category": "external", "summary": "SUSE Bug 760264 for CVE-2011-3078", "url": "https://bugzilla.suse.com/760264" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3078" }, { "cve": "CVE-2011-3079", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3079" } ], "notes": [ { "category": "general", "text": "The Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168, as used in Mozilla Firefox before 38.0 and other products, does not properly validate messages, which has unspecified impact and attack vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3079", "url": "https://www.suse.com/security/cve/CVE-2011-3079" }, { "category": "external", "summary": "SUSE Bug 1122983 for CVE-2011-3079", "url": "https://bugzilla.suse.com/1122983" }, { "category": "external", "summary": "SUSE Bug 760264 for CVE-2011-3079", "url": "https://bugzilla.suse.com/760264" }, { "category": "external", "summary": "SUSE Bug 930622 for CVE-2011-3079", "url": "https://bugzilla.suse.com/930622" }, { "category": "external", "summary": "SUSE Bug 986639 for CVE-2011-3079", "url": "https://bugzilla.suse.com/986639" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3079" }, { "cve": "CVE-2011-3080", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3080" } ], "notes": [ { "category": "general", "text": "Race condition in the Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168 allows attackers to bypass intended sandbox restrictions via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3080", "url": "https://www.suse.com/security/cve/CVE-2011-3080" }, { "category": "external", "summary": "SUSE Bug 760264 for CVE-2011-3080", "url": "https://bugzilla.suse.com/760264" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3080" }, { "cve": "CVE-2011-3081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3081" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 18.0.1025.168 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the floating of elements, a different vulnerability than CVE-2011-3078.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3081", "url": "https://www.suse.com/security/cve/CVE-2011-3081" }, { "category": "external", "summary": "SUSE Bug 760264 for CVE-2011-3081", "url": "https://bugzilla.suse.com/760264" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-3081" }, { "cve": "CVE-2011-3083", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3083" } ], "notes": [ { "category": "general", "text": "browser/profiles/profile_impl_io_data.cc in Google Chrome before 19.0.1084.46 does not properly handle a malformed ftp URL in the SRC attribute of a VIDEO element, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted web page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3083", "url": "https://www.suse.com/security/cve/CVE-2011-3083" }, { "category": "external", "summary": "SUSE Bug 762481 for CVE-2011-3083", "url": "https://bugzilla.suse.com/762481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3083" }, { "cve": "CVE-2011-3084", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3084" } ], "notes": [ { "category": "general", "text": "Google Chrome before 19.0.1084.46 does not use a dedicated process for the loading of links found on an internal page, which might allow attackers to bypass intended sandbox restrictions via a crafted page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3084", "url": "https://www.suse.com/security/cve/CVE-2011-3084" }, { "category": "external", "summary": "SUSE Bug 762481 for CVE-2011-3084", "url": "https://bugzilla.suse.com/762481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3084" }, { "cve": "CVE-2011-3085", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3085" } ], "notes": [ { "category": "general", "text": "The Autofill feature in Google Chrome before 19.0.1084.46 does not properly restrict field values, which allows remote attackers to cause a denial of service (UI corruption) and possibly conduct spoofing attacks via vectors involving long values.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3085", "url": "https://www.suse.com/security/cve/CVE-2011-3085" }, { "category": "external", "summary": "SUSE Bug 762481 for CVE-2011-3085", "url": "https://bugzilla.suse.com/762481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3085" }, { "cve": "CVE-2011-3086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3086" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 19.0.1084.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a STYLE element.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3086", "url": "https://www.suse.com/security/cve/CVE-2011-3086" }, { "category": "external", "summary": "SUSE Bug 762481 for CVE-2011-3086", "url": "https://bugzilla.suse.com/762481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-3086" }, { "cve": "CVE-2011-3087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3087" } ], "notes": [ { "category": "general", "text": "Google Chrome before 19.0.1084.46 does not properly perform window navigation, which has unspecified impact and remote attack vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3087", "url": "https://www.suse.com/security/cve/CVE-2011-3087" }, { "category": "external", "summary": "SUSE Bug 762481 for CVE-2011-3087", "url": "https://bugzilla.suse.com/762481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-3087" }, { "cve": "CVE-2011-3088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3088" } ], "notes": [ { "category": "general", "text": "Google Chrome before 19.0.1084.46 does not properly draw hairlines, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3088", "url": "https://www.suse.com/security/cve/CVE-2011-3088" }, { "category": "external", "summary": "SUSE Bug 762481 for CVE-2011-3088", "url": "https://bugzilla.suse.com/762481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3088" }, { "cve": "CVE-2011-3089", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3089" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 19.0.1084.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving tables.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3089", "url": "https://www.suse.com/security/cve/CVE-2011-3089" }, { "category": "external", "summary": "SUSE Bug 762481 for CVE-2011-3089", "url": "https://bugzilla.suse.com/762481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-3089" }, { "cve": "CVE-2011-3090", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3090" } ], "notes": [ { "category": "general", "text": "Race condition in Google Chrome before 19.0.1084.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to worker processes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3090", "url": "https://www.suse.com/security/cve/CVE-2011-3090" }, { "category": "external", "summary": "SUSE Bug 762481 for CVE-2011-3090", "url": "https://bugzilla.suse.com/762481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3090" }, { "cve": "CVE-2011-3091", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3091" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the IndexedDB implementation in Google Chrome before 19.0.1084.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3091", "url": "https://www.suse.com/security/cve/CVE-2011-3091" }, { "category": "external", "summary": "SUSE Bug 762481 for CVE-2011-3091", "url": "https://bugzilla.suse.com/762481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-3091" }, { "cve": "CVE-2011-3092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3092" } ], "notes": [ { "category": "general", "text": "The regex implementation in Google V8, as used in Google Chrome before 19.0.1084.46, allows remote attackers to cause a denial of service (invalid write operation) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3092", "url": "https://www.suse.com/security/cve/CVE-2011-3092" }, { "category": "external", "summary": "SUSE Bug 762481 for CVE-2011-3092", "url": "https://bugzilla.suse.com/762481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3092" }, { "cve": "CVE-2011-3093", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3093" } ], "notes": [ { "category": "general", "text": "Google Chrome before 19.0.1084.46 does not properly handle glyphs, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3093", "url": "https://www.suse.com/security/cve/CVE-2011-3093" }, { "category": "external", "summary": "SUSE Bug 762481 for CVE-2011-3093", "url": "https://bugzilla.suse.com/762481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3093" }, { "cve": "CVE-2011-3094", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3094" } ], "notes": [ { "category": "general", "text": "Google Chrome before 19.0.1084.46 does not properly handle Tibetan text, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3094", "url": "https://www.suse.com/security/cve/CVE-2011-3094" }, { "category": "external", "summary": "SUSE Bug 762481 for CVE-2011-3094", "url": "https://bugzilla.suse.com/762481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3094" }, { "cve": "CVE-2011-3095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3095" } ], "notes": [ { "category": "general", "text": "The OGG container in Google Chrome before 19.0.1084.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an out-of-bounds write.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3095", "url": "https://www.suse.com/security/cve/CVE-2011-3095" }, { "category": "external", "summary": "SUSE Bug 762481 for CVE-2011-3095", "url": "https://bugzilla.suse.com/762481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-3095" }, { "cve": "CVE-2011-3096", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3096" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 19.0.1084.46 on Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging an error in the GTK implementation of the omnibox.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3096", "url": "https://www.suse.com/security/cve/CVE-2011-3096" }, { "category": "external", "summary": "SUSE Bug 762481 for CVE-2011-3096", "url": "https://bugzilla.suse.com/762481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3096" }, { "cve": "CVE-2011-3098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3098" } ], "notes": [ { "category": "general", "text": "Google Chrome before 19.0.1084.46 on Windows uses an incorrect search path for the Windows Media Player plug-in, which might allow local users to gain privileges via a Trojan horse plug-in in an unspecified directory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3098", "url": "https://www.suse.com/security/cve/CVE-2011-3098" }, { "category": "external", "summary": "SUSE Bug 762481 for CVE-2011-3098", "url": "https://bugzilla.suse.com/762481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3098" }, { "cve": "CVE-2011-3100", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3100" } ], "notes": [ { "category": "general", "text": "Google Chrome before 19.0.1084.46 does not properly draw dash paths, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3100", "url": "https://www.suse.com/security/cve/CVE-2011-3100" }, { "category": "external", "summary": "SUSE Bug 762481 for CVE-2011-3100", "url": "https://bugzilla.suse.com/762481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3100" }, { "cve": "CVE-2011-3101", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3101" } ], "notes": [ { "category": "general", "text": "Google Chrome before 19.0.1084.46 on Linux does not properly mitigate an unspecified flaw in an NVIDIA driver, which has unknown impact and attack vectors. NOTE: see CVE-2012-3105 for the related MFSA 2012-34 issue in Mozilla products.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3101", "url": "https://www.suse.com/security/cve/CVE-2011-3101" }, { "category": "external", "summary": "SUSE Bug 762481 for CVE-2011-3101", "url": "https://bugzilla.suse.com/762481" }, { "category": "external", "summary": "SUSE Bug 765204 for CVE-2011-3101", "url": "https://bugzilla.suse.com/765204" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-3101" }, { "cve": "CVE-2011-3102", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3102" } ], "notes": [ { "category": "general", "text": "Off-by-one error in libxml2, as used in Google Chrome before 19.0.1084.46 and other products, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3102", "url": "https://www.suse.com/security/cve/CVE-2011-3102" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2011-3102", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 762481 for CVE-2011-3102", "url": "https://bugzilla.suse.com/762481" }, { "category": "external", "summary": "SUSE Bug 764538 for CVE-2011-3102", "url": "https://bugzilla.suse.com/764538" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3102" }, { "cve": "CVE-2011-3903", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3903" } ], "notes": [ { "category": "general", "text": "Google Chrome before 16.0.912.63 does not properly perform regex matching, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3903", "url": "https://www.suse.com/security/cve/CVE-2011-3903" }, { "category": "external", "summary": "SUSE Bug 736716 for CVE-2011-3903", "url": "https://bugzilla.suse.com/736716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3903" }, { "cve": "CVE-2011-3904", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3904" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to bidirectional text (aka bidi) handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3904", "url": "https://www.suse.com/security/cve/CVE-2011-3904" }, { "category": "external", "summary": "SUSE Bug 736716 for CVE-2011-3904", "url": "https://bugzilla.suse.com/736716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3904" }, { "cve": "CVE-2011-3905", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3905" } ], "notes": [ { "category": "general", "text": "libxml2, as used in Google Chrome before 16.0.912.63, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3905", "url": "https://www.suse.com/security/cve/CVE-2011-3905" }, { "category": "external", "summary": "SUSE Bug 736716 for CVE-2011-3905", "url": "https://bugzilla.suse.com/736716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3905" }, { "cve": "CVE-2011-3906", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3906" } ], "notes": [ { "category": "general", "text": "The PDF parser in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3906", "url": "https://www.suse.com/security/cve/CVE-2011-3906" }, { "category": "external", "summary": "SUSE Bug 736716 for CVE-2011-3906", "url": "https://bugzilla.suse.com/736716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3906" }, { "cve": "CVE-2011-3907", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3907" } ], "notes": [ { "category": "general", "text": "The view-source feature in Google Chrome before 16.0.912.63 allows remote attackers to spoof the URL bar via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3907", "url": "https://www.suse.com/security/cve/CVE-2011-3907" }, { "category": "external", "summary": "SUSE Bug 736716 for CVE-2011-3907", "url": "https://bugzilla.suse.com/736716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3907" }, { "cve": "CVE-2011-3908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3908" } ], "notes": [ { "category": "general", "text": "Google Chrome before 16.0.912.63 does not properly parse SVG documents, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3908", "url": "https://www.suse.com/security/cve/CVE-2011-3908" }, { "category": "external", "summary": "SUSE Bug 736716 for CVE-2011-3908", "url": "https://bugzilla.suse.com/736716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3908" }, { "cve": "CVE-2011-3909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3909" } ], "notes": [ { "category": "general", "text": "The Cascading Style Sheets (CSS) implementation in Google Chrome before 16.0.912.63 on 64-bit platforms does not properly manage property arrays, which allows remote attackers to cause a denial of service (memory corruption) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3909", "url": "https://www.suse.com/security/cve/CVE-2011-3909" }, { "category": "external", "summary": "SUSE Bug 736716 for CVE-2011-3909", "url": "https://bugzilla.suse.com/736716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3909" }, { "cve": "CVE-2011-3910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3910" } ], "notes": [ { "category": "general", "text": "Google Chrome before 16.0.912.63 does not properly handle YUV video frames, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3910", "url": "https://www.suse.com/security/cve/CVE-2011-3910" }, { "category": "external", "summary": "SUSE Bug 736716 for CVE-2011-3910", "url": "https://bugzilla.suse.com/736716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3910" }, { "cve": "CVE-2011-3911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3911" } ], "notes": [ { "category": "general", "text": "Google Chrome before 16.0.912.63 does not properly handle PDF documents, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3911", "url": "https://www.suse.com/security/cve/CVE-2011-3911" }, { "category": "external", "summary": "SUSE Bug 736716 for CVE-2011-3911", "url": "https://bugzilla.suse.com/736716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3911" }, { "cve": "CVE-2011-3912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3912" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG filters.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3912", "url": "https://www.suse.com/security/cve/CVE-2011-3912" }, { "category": "external", "summary": "SUSE Bug 736716 for CVE-2011-3912", "url": "https://bugzilla.suse.com/736716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3912" }, { "cve": "CVE-2011-3914", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3914" } ], "notes": [ { "category": "general", "text": "The internationalization (aka i18n) functionality in Google V8, as used in Google Chrome before 16.0.912.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an out-of-bounds write.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3914", "url": "https://www.suse.com/security/cve/CVE-2011-3914" }, { "category": "external", "summary": "SUSE Bug 736716 for CVE-2011-3914", "url": "https://bugzilla.suse.com/736716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3914" }, { "cve": "CVE-2011-3915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3915" } ], "notes": [ { "category": "general", "text": "Buffer overflow in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to PDF fonts.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3915", "url": "https://www.suse.com/security/cve/CVE-2011-3915" }, { "category": "external", "summary": "SUSE Bug 736716 for CVE-2011-3915", "url": "https://bugzilla.suse.com/736716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3915" }, { "cve": "CVE-2011-3916", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3916" } ], "notes": [ { "category": "general", "text": "Google Chrome before 16.0.912.63 does not properly handle PDF cross references, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3916", "url": "https://www.suse.com/security/cve/CVE-2011-3916" }, { "category": "external", "summary": "SUSE Bug 736716 for CVE-2011-3916", "url": "https://bugzilla.suse.com/736716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3916" }, { "cve": "CVE-2011-3917", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3917" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in FileWatcher in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3917", "url": "https://www.suse.com/security/cve/CVE-2011-3917" }, { "category": "external", "summary": "SUSE Bug 736716 for CVE-2011-3917", "url": "https://bugzilla.suse.com/736716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3917" }, { "cve": "CVE-2011-3919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3919" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in libxml2, as used in Google Chrome before 16.0.912.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3919", "url": "https://www.suse.com/security/cve/CVE-2011-3919" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2011-3919", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 739894 for CVE-2011-3919", "url": "https://bugzilla.suse.com/739894" }, { "category": "external", "summary": "SUSE Bug 740493 for CVE-2011-3919", "url": "https://bugzilla.suse.com/740493" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3919" }, { "cve": "CVE-2011-3921", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3921" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 16.0.912.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving animation frames.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3921", "url": "https://www.suse.com/security/cve/CVE-2011-3921" }, { "category": "external", "summary": "SUSE Bug 740493 for CVE-2011-3921", "url": "https://bugzilla.suse.com/740493" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3921" }, { "cve": "CVE-2011-3922", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3922" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in Google Chrome before 16.0.912.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to glyph handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3922", "url": "https://www.suse.com/security/cve/CVE-2011-3922" }, { "category": "external", "summary": "SUSE Bug 739904 for CVE-2011-3922", "url": "https://bugzilla.suse.com/739904" }, { "category": "external", "summary": "SUSE Bug 740493 for CVE-2011-3922", "url": "https://bugzilla.suse.com/740493" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3922" }, { "cve": "CVE-2011-3924", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3924" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 16.0.912.77 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOM selections.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3924", "url": "https://www.suse.com/security/cve/CVE-2011-3924" }, { "category": "external", "summary": "SUSE Bug 743319 for CVE-2011-3924", "url": "https://bugzilla.suse.com/743319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3924" }, { "cve": "CVE-2011-3925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3925" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the Safe Browsing feature in Google Chrome before 16.0.912.75 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors related to a navigation entry and an interstitial page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3925", "url": "https://www.suse.com/security/cve/CVE-2011-3925" }, { "category": "external", "summary": "SUSE Bug 743319 for CVE-2011-3925", "url": "https://bugzilla.suse.com/743319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3925" }, { "cve": "CVE-2011-3926", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3926" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the tree builder in Google Chrome before 16.0.912.77 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3926", "url": "https://www.suse.com/security/cve/CVE-2011-3926" }, { "category": "external", "summary": "SUSE Bug 743319 for CVE-2011-3926", "url": "https://bugzilla.suse.com/743319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3926" }, { "cve": "CVE-2011-3927", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3927" } ], "notes": [ { "category": "general", "text": "Skia, as used in Google Chrome before 16.0.912.77, does not perform all required initialization of values, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3927", "url": "https://www.suse.com/security/cve/CVE-2011-3927" }, { "category": "external", "summary": "SUSE Bug 743319 for CVE-2011-3927", "url": "https://bugzilla.suse.com/743319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3927" }, { "cve": "CVE-2011-3928", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3928" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 16.0.912.77 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOM handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3928", "url": "https://www.suse.com/security/cve/CVE-2011-3928" }, { "category": "external", "summary": "SUSE Bug 743319 for CVE-2011-3928", "url": "https://bugzilla.suse.com/743319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3928" }, { "cve": "CVE-2011-3953", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3953" } ], "notes": [ { "category": "general", "text": "Google Chrome before 17.0.963.46 does not prevent monitoring of the clipboard after a paste event, which has unspecified impact and remote attack vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3953", "url": "https://www.suse.com/security/cve/CVE-2011-3953" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3953", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3953" }, { "cve": "CVE-2011-3954", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3954" } ], "notes": [ { "category": "general", "text": "Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service (application crash) via vectors that trigger a large amount of database usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3954", "url": "https://www.suse.com/security/cve/CVE-2011-3954" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3954", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3954" }, { "cve": "CVE-2011-3955", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3955" } ], "notes": [ { "category": "general", "text": "Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors that trigger the aborting of an IndexedDB transaction.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3955", "url": "https://www.suse.com/security/cve/CVE-2011-3955" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3955", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3955" }, { "cve": "CVE-2011-3956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3956" } ], "notes": [ { "category": "general", "text": "The extension implementation in Google Chrome before 17.0.963.46 does not properly handle sandboxed origins, which might allow remote attackers to bypass the Same Origin Policy via a crafted extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3956", "url": "https://www.suse.com/security/cve/CVE-2011-3956" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3956", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3956" }, { "cve": "CVE-2011-3957", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3957" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the garbage-collection functionality in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving PDF documents.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3957", "url": "https://www.suse.com/security/cve/CVE-2011-3957" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3957", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3957" }, { "cve": "CVE-2011-3958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3958" } ], "notes": [ { "category": "general", "text": "Google Chrome before 17.0.963.46 does not properly perform casts of variables during handling of a column span, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3958", "url": "https://www.suse.com/security/cve/CVE-2011-3958" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3958", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3958" }, { "cve": "CVE-2011-3959", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3959" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the locale implementation in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3959", "url": "https://www.suse.com/security/cve/CVE-2011-3959" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3959", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3959" }, { "cve": "CVE-2011-3960", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3960" } ], "notes": [ { "category": "general", "text": "Google Chrome before 17.0.963.46 does not properly decode audio data, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3960", "url": "https://www.suse.com/security/cve/CVE-2011-3960" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3960", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3960" }, { "cve": "CVE-2011-3961", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3961" } ], "notes": [ { "category": "general", "text": "Race condition in Google Chrome before 17.0.963.46 allows remote attackers to execute arbitrary code via vectors that trigger a crash of a utility process.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3961", "url": "https://www.suse.com/security/cve/CVE-2011-3961" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3961", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-3961" }, { "cve": "CVE-2011-3962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3962" } ], "notes": [ { "category": "general", "text": "Google Chrome before 17.0.963.46 does not properly perform path clipping, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3962", "url": "https://www.suse.com/security/cve/CVE-2011-3962" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3962", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3962" }, { "cve": "CVE-2011-3963", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3963" } ], "notes": [ { "category": "general", "text": "Google Chrome before 17.0.963.46 does not properly handle PDF FAX images, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3963", "url": "https://www.suse.com/security/cve/CVE-2011-3963" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3963", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3963" }, { "cve": "CVE-2011-3964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3964" } ], "notes": [ { "category": "general", "text": "Google Chrome before 17.0.963.46 does not properly implement the drag-and-drop feature, which makes it easier for remote attackers to spoof the URL bar via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3964", "url": "https://www.suse.com/security/cve/CVE-2011-3964" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3964", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3964" }, { "cve": "CVE-2011-3965", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3965" } ], "notes": [ { "category": "general", "text": "Google Chrome before 17.0.963.46 does not properly check signatures, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3965", "url": "https://www.suse.com/security/cve/CVE-2011-3965" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3965", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3965" }, { "cve": "CVE-2011-3966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3966" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to error handling for Cascading Style Sheets (CSS) token-sequence data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3966", "url": "https://www.suse.com/security/cve/CVE-2011-3966" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3966", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3966" }, { "cve": "CVE-2011-3967", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3967" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service (application crash) via a crafted certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3967", "url": "https://www.suse.com/security/cve/CVE-2011-3967" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3967", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3967" }, { "cve": "CVE-2011-3968", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3968" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving Cascading Style Sheets (CSS) token sequences.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3968", "url": "https://www.suse.com/security/cve/CVE-2011-3968" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3968", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3968" }, { "cve": "CVE-2011-3969", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3969" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to layout of SVG documents.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3969", "url": "https://www.suse.com/security/cve/CVE-2011-3969" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3969", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3969" }, { "cve": "CVE-2011-3970", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3970" } ], "notes": [ { "category": "general", "text": "libxslt, as used in Google Chrome before 17.0.963.46, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3970", "url": "https://www.suse.com/security/cve/CVE-2011-3970" }, { "category": "external", "summary": "SUSE Bug 746039 for CVE-2011-3970", "url": "https://bugzilla.suse.com/746039" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3970", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3970" }, { "cve": "CVE-2011-3971", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3971" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 17.0.963.46 allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to mousemove events.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3971", "url": "https://www.suse.com/security/cve/CVE-2011-3971" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3971", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3971" }, { "cve": "CVE-2011-3972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3972" } ], "notes": [ { "category": "general", "text": "The shader translator implementation in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3972", "url": "https://www.suse.com/security/cve/CVE-2011-3972" }, { "category": "external", "summary": "SUSE Bug 747327 for CVE-2011-3972", "url": "https://bugzilla.suse.com/747327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3972" }, { "cve": "CVE-2012-1521", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1521" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the XML parser in Google Chrome before 18.0.1025.168 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1521", "url": "https://www.suse.com/security/cve/CVE-2012-1521" }, { "category": "external", "summary": "SUSE Bug 760264 for CVE-2012-1521", "url": "https://bugzilla.suse.com/760264" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-1521" }, { "cve": "CVE-2012-2807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2807" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in libxml2, as used in Google Chrome before 20.0.1132.43 and other products, on 64-bit Linux platforms allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2807", "url": "https://www.suse.com/security/cve/CVE-2012-2807" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2012-2807", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 769181 for CVE-2012-2807", "url": "https://bugzilla.suse.com/769181" }, { "category": "external", "summary": "SUSE Bug 769184 for CVE-2012-2807", "url": "https://bugzilla.suse.com/769184" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2807" }, { "cve": "CVE-2012-2815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2815" } ], "notes": [ { "category": "general", "text": "Google Chrome before 20.0.1132.43 allows remote attackers to obtain potentially sensitive information from a fragment identifier by leveraging access to an IFRAME element associated with a different domain.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2815", "url": "https://www.suse.com/security/cve/CVE-2012-2815" }, { "category": "external", "summary": "SUSE Bug 769181 for CVE-2012-2815", "url": "https://bugzilla.suse.com/769181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2815" }, { "cve": "CVE-2012-2816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2816" } ], "notes": [ { "category": "general", "text": "Google Chrome before 20.0.1132.43 on Windows does not properly isolate sandboxed processes, which might allow remote attackers to cause a denial of service (process interference) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2816", "url": "https://www.suse.com/security/cve/CVE-2012-2816" }, { "category": "external", "summary": "SUSE Bug 769181 for CVE-2012-2816", "url": "https://bugzilla.suse.com/769181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2816" }, { "cve": "CVE-2012-2817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2817" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to tables that have sections.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2817", "url": "https://www.suse.com/security/cve/CVE-2012-2817" }, { "category": "external", "summary": "SUSE Bug 769181 for CVE-2012-2817", "url": "https://bugzilla.suse.com/769181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2817" }, { "cve": "CVE-2012-2818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2818" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the layout of documents that use the Cascading Style Sheets (CSS) counters feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2818", "url": "https://www.suse.com/security/cve/CVE-2012-2818" }, { "category": "external", "summary": "SUSE Bug 769181 for CVE-2012-2818", "url": "https://bugzilla.suse.com/769181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2818" }, { "cve": "CVE-2012-2819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2819" } ], "notes": [ { "category": "general", "text": "The texSubImage2D implementation in the WebGL subsystem in Google Chrome before 20.0.1132.43 does not properly handle uploads to floating-point textures, which allows remote attackers to cause a denial of service (assertion failure and application crash) or possibly have unspecified other impact via a crafted web page, as demonstrated by certain WebGL performance tests, aka rdar problem 11520387.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2819", "url": "https://www.suse.com/security/cve/CVE-2012-2819" }, { "category": "external", "summary": "SUSE Bug 769181 for CVE-2012-2819", "url": "https://bugzilla.suse.com/769181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2819" }, { "cve": "CVE-2012-2820", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2820" } ], "notes": [ { "category": "general", "text": "Google Chrome before 20.0.1132.43 does not properly implement SVG filters, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2820", "url": "https://www.suse.com/security/cve/CVE-2012-2820" }, { "category": "external", "summary": "SUSE Bug 769181 for CVE-2012-2820", "url": "https://bugzilla.suse.com/769181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2820" }, { "cve": "CVE-2012-2821", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2821" } ], "notes": [ { "category": "general", "text": "The autofill implementation in Google Chrome before 20.0.1132.43 does not properly display text, which has unspecified impact and remote attack vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2821", "url": "https://www.suse.com/security/cve/CVE-2012-2821" }, { "category": "external", "summary": "SUSE Bug 769181 for CVE-2012-2821", "url": "https://bugzilla.suse.com/769181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2821" }, { "cve": "CVE-2012-2823", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2823" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG resources.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2823", "url": "https://www.suse.com/security/cve/CVE-2012-2823" }, { "category": "external", "summary": "SUSE Bug 769181 for CVE-2012-2823", "url": "https://bugzilla.suse.com/769181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2823" }, { "cve": "CVE-2012-2825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2825" } ], "notes": [ { "category": "general", "text": "The XSL implementation in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service (incorrect read operation) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2825", "url": "https://www.suse.com/security/cve/CVE-2012-2825" }, { "category": "external", "summary": "SUSE Bug 769181 for CVE-2012-2825", "url": "https://bugzilla.suse.com/769181" }, { "category": "external", "summary": "SUSE Bug 769182 for CVE-2012-2825", "url": "https://bugzilla.suse.com/769182" }, { "category": "external", "summary": "SUSE Bug 849019 for CVE-2012-2825", "url": "https://bugzilla.suse.com/849019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2825" }, { "cve": "CVE-2012-2826", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2826" } ], "notes": [ { "category": "general", "text": "Google Chrome before 20.0.1132.43 does not properly implement texture conversion, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2826", "url": "https://www.suse.com/security/cve/CVE-2012-2826" }, { "category": "external", "summary": "SUSE Bug 769181 for CVE-2012-2826", "url": "https://bugzilla.suse.com/769181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2826" }, { "cve": "CVE-2012-2829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2829" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2829", "url": "https://www.suse.com/security/cve/CVE-2012-2829" }, { "category": "external", "summary": "SUSE Bug 769181 for CVE-2012-2829", "url": "https://bugzilla.suse.com/769181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2829" }, { "cve": "CVE-2012-2830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2830" } ], "notes": [ { "category": "general", "text": "Google Chrome before 20.0.1132.43 does not properly set array values, which allows remote attackers to cause a denial of service (incorrect pointer use) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2830", "url": "https://www.suse.com/security/cve/CVE-2012-2830" }, { "category": "external", "summary": "SUSE Bug 769181 for CVE-2012-2830", "url": "https://bugzilla.suse.com/769181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2830" }, { "cve": "CVE-2012-2831", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2831" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG references.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2831", "url": "https://www.suse.com/security/cve/CVE-2012-2831" }, { "category": "external", "summary": "SUSE Bug 769181 for CVE-2012-2831", "url": "https://bugzilla.suse.com/769181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2831" }, { "cve": "CVE-2012-2834", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2834" } ], "notes": [ { "category": "general", "text": "Integer overflow in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted data in the Matroska container format.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2834", "url": "https://www.suse.com/security/cve/CVE-2012-2834" }, { "category": "external", "summary": "SUSE Bug 769181 for CVE-2012-2834", "url": "https://bugzilla.suse.com/769181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-2834" }, { "cve": "CVE-2012-2842", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2842" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 20.0.1132.57 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to counter handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2842", "url": "https://www.suse.com/security/cve/CVE-2012-2842" }, { "category": "external", "summary": "SUSE Bug 770821 for CVE-2012-2842", "url": "https://bugzilla.suse.com/770821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2842" }, { "cve": "CVE-2012-2843", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2843" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 20.0.1132.57 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to layout height tracking.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2843", "url": "https://www.suse.com/security/cve/CVE-2012-2843" }, { "category": "external", "summary": "SUSE Bug 770821 for CVE-2012-2843", "url": "https://bugzilla.suse.com/770821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2843" }, { "cve": "CVE-2012-2865", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2865" } ], "notes": [ { "category": "general", "text": "Google Chrome before 21.0.1180.89 does not properly perform line breaking, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2865", "url": "https://www.suse.com/security/cve/CVE-2012-2865" }, { "category": "external", "summary": "SUSE Bug 778005 for CVE-2012-2865", "url": "https://bugzilla.suse.com/778005" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2865" }, { "cve": "CVE-2012-2866", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2866" } ], "notes": [ { "category": "general", "text": "Google Chrome before 21.0.1180.89 does not properly perform a cast of an unspecified variable during handling of run-in elements, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2866", "url": "https://www.suse.com/security/cve/CVE-2012-2866" }, { "category": "external", "summary": "SUSE Bug 778005 for CVE-2012-2866", "url": "https://bugzilla.suse.com/778005" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2866" }, { "cve": "CVE-2012-2867", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2867" } ], "notes": [ { "category": "general", "text": "The SPDY implementation in Google Chrome before 21.0.1180.89 allows remote attackers to cause a denial of service (application crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2867", "url": "https://www.suse.com/security/cve/CVE-2012-2867" }, { "category": "external", "summary": "SUSE Bug 778005 for CVE-2012-2867", "url": "https://bugzilla.suse.com/778005" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2867" }, { "cve": "CVE-2012-2868", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2868" } ], "notes": [ { "category": "general", "text": "Race condition in Google Chrome before 21.0.1180.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving improper interaction between worker processes and an XMLHttpRequest (aka XHR) object.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2868", "url": "https://www.suse.com/security/cve/CVE-2012-2868" }, { "category": "external", "summary": "SUSE Bug 778005 for CVE-2012-2868", "url": "https://bugzilla.suse.com/778005" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2868" }, { "cve": "CVE-2012-2869", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2869" } ], "notes": [ { "category": "general", "text": "Google Chrome before 21.0.1180.89 does not properly load URLs, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a \"stale buffer.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2869", "url": "https://www.suse.com/security/cve/CVE-2012-2869" }, { "category": "external", "summary": "SUSE Bug 778005 for CVE-2012-2869", "url": "https://bugzilla.suse.com/778005" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2869" }, { "cve": "CVE-2012-2870", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2870" } ], "notes": [ { "category": "general", "text": "libxslt 1.1.26 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly manage memory, which might allow remote attackers to cause a denial of service (application crash) via a crafted XSLT expression that is not properly identified during XPath navigation, related to (1) the xsltCompileLocationPathPattern function in libxslt/pattern.c and (2) the xsltGenerateIdFunction function in libxslt/functions.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2870", "url": "https://www.suse.com/security/cve/CVE-2012-2870" }, { "category": "external", "summary": "SUSE Bug 778005 for CVE-2012-2870", "url": "https://bugzilla.suse.com/778005" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2870" }, { "cve": "CVE-2012-2871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2871" } ], "notes": [ { "category": "general", "text": "libxml2 2.9.0-rc1 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly support a cast of an unspecified variable during handling of XSL transforms, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document, related to the _xmlNs data structure in include/libxml/tree.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2871", "url": "https://www.suse.com/security/cve/CVE-2012-2871" }, { "category": "external", "summary": "SUSE Bug 1078828 for CVE-2012-2871", "url": "https://bugzilla.suse.com/1078828" }, { "category": "external", "summary": "SUSE Bug 778005 for CVE-2012-2871", "url": "https://bugzilla.suse.com/778005" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2871" }, { "cve": "CVE-2012-2872", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2872" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in an SSL interstitial page in Google Chrome before 21.0.1180.89 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2872", "url": "https://www.suse.com/security/cve/CVE-2012-2872" }, { "category": "external", "summary": "SUSE Bug 778005 for CVE-2012-2872", "url": "https://bugzilla.suse.com/778005" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2872" }, { "cve": "CVE-2012-2874", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2874" } ], "notes": [ { "category": "general", "text": "Skia, as used in Google Chrome before 22.0.1229.79, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation, a different vulnerability than CVE-2012-2883.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2874", "url": "https://www.suse.com/security/cve/CVE-2012-2874" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2874", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2874" }, { "cve": "CVE-2012-2876", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2876" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the SSE2 optimization functionality in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2876", "url": "https://www.suse.com/security/cve/CVE-2012-2876" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2876", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2876" }, { "cve": "CVE-2012-2877", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2877" } ], "notes": [ { "category": "general", "text": "The extension system in Google Chrome before 22.0.1229.79 does not properly handle modal dialogs, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2877", "url": "https://www.suse.com/security/cve/CVE-2012-2877" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2877", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2877" }, { "cve": "CVE-2012-2878", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2878" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to plug-in handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2878", "url": "https://www.suse.com/security/cve/CVE-2012-2878" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2878", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2878" }, { "cve": "CVE-2012-2879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2879" } ], "notes": [ { "category": "general", "text": "Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service (DOM topology corruption) via a crafted document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2879", "url": "https://www.suse.com/security/cve/CVE-2012-2879" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2879", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2879" }, { "cve": "CVE-2012-2880", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2880" } ], "notes": [ { "category": "general", "text": "Race condition in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the plug-in paint buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2880", "url": "https://www.suse.com/security/cve/CVE-2012-2880" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2880", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2880" }, { "cve": "CVE-2012-2881", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2881" } ], "notes": [ { "category": "general", "text": "Google Chrome before 22.0.1229.79 does not properly handle plug-ins, which allows remote attackers to cause a denial of service (DOM tree corruption) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2881", "url": "https://www.suse.com/security/cve/CVE-2012-2881" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2881", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2881" }, { "cve": "CVE-2012-2882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2882" } ], "notes": [ { "category": "general", "text": "FFmpeg, as used in Google Chrome before 22.0.1229.79, does not properly handle OGG containers, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors, related to a \"wild pointer\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2882", "url": "https://www.suse.com/security/cve/CVE-2012-2882" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2882", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2882" }, { "cve": "CVE-2012-2883", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2883" } ], "notes": [ { "category": "general", "text": "Skia, as used in Google Chrome before 22.0.1229.79, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation, a different vulnerability than CVE-2012-2874.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2883", "url": "https://www.suse.com/security/cve/CVE-2012-2883" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2883", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2883" }, { "cve": "CVE-2012-2884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2884" } ], "notes": [ { "category": "general", "text": "Skia, as used in Google Chrome before 22.0.1229.79, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2884", "url": "https://www.suse.com/security/cve/CVE-2012-2884" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2884", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2884" }, { "cve": "CVE-2012-2885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2885" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to application exit.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2885", "url": "https://www.suse.com/security/cve/CVE-2012-2885" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2885", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2885" }, { "cve": "CVE-2012-2886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2886" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to inject arbitrary web script or HTML via vectors related to the Google V8 bindings, aka \"Universal XSS (UXSS).\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2886", "url": "https://www.suse.com/security/cve/CVE-2012-2886" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2886", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2886" }, { "cve": "CVE-2012-2887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2887" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving onclick events.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2887", "url": "https://www.suse.com/security/cve/CVE-2012-2887" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2887", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2887" }, { "cve": "CVE-2012-2888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2888" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving SVG text references.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2888", "url": "https://www.suse.com/security/cve/CVE-2012-2888" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2888", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2888" }, { "cve": "CVE-2012-2889", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2889" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to inject arbitrary web script or HTML via vectors involving frames, aka \"Universal XSS (UXSS).\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2889", "url": "https://www.suse.com/security/cve/CVE-2012-2889" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2889", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2889" }, { "cve": "CVE-2012-2891", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2891" } ], "notes": [ { "category": "general", "text": "The IPC implementation in Google Chrome before 22.0.1229.79 allows attackers to obtain potentially sensitive information about memory addresses via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2891", "url": "https://www.suse.com/security/cve/CVE-2012-2891" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2891", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2891" }, { "cve": "CVE-2012-2892", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2892" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to bypass the pop-up blocker via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2892", "url": "https://www.suse.com/security/cve/CVE-2012-2892" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2892", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2892" }, { "cve": "CVE-2012-2893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2893" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in libxslt, as used in Google Chrome before 22.0.1229.79, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XSL transforms.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2893", "url": "https://www.suse.com/security/cve/CVE-2012-2893" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2893", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2893" }, { "cve": "CVE-2012-2894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2894" } ], "notes": [ { "category": "general", "text": "Google Chrome before 22.0.1229.79 does not properly handle graphics-context data structures, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2894", "url": "https://www.suse.com/security/cve/CVE-2012-2894" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2894", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2894" }, { "cve": "CVE-2012-2896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2896" } ], "notes": [ { "category": "general", "text": "Integer overflow in the WebGL implementation in Google Chrome before 22.0.1229.79 on Mac OS X allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2896", "url": "https://www.suse.com/security/cve/CVE-2012-2896" }, { "category": "external", "summary": "SUSE Bug 782257 for CVE-2012-2896", "url": "https://bugzilla.suse.com/782257" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2896" }, { "cve": "CVE-2012-5130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5130" } ], "notes": [ { "category": "general", "text": "Skia, as used in Google Chrome before 23.0.1271.91, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5130", "url": "https://www.suse.com/security/cve/CVE-2012-5130" }, { "category": "external", "summary": "SUSE Bug 791234 for CVE-2012-5130", "url": "https://bugzilla.suse.com/791234" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-5130" }, { "cve": "CVE-2012-5131", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5131" } ], "notes": [ { "category": "general", "text": "Google Chrome before 23.0.1271.91 on Mac OS X does not properly mitigate improper rendering behavior in the Intel GPU driver, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5131", "url": "https://www.suse.com/security/cve/CVE-2012-5131" }, { "category": "external", "summary": "SUSE Bug 791234 for CVE-2012-5131", "url": "https://bugzilla.suse.com/791234" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-5131" }, { "cve": "CVE-2012-5132", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5132" } ], "notes": [ { "category": "general", "text": "Google Chrome before 23.0.1271.91 allows remote attackers to cause a denial of service (application crash) via a response with chunked transfer coding.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5132", "url": "https://www.suse.com/security/cve/CVE-2012-5132" }, { "category": "external", "summary": "SUSE Bug 791234 for CVE-2012-5132", "url": "https://bugzilla.suse.com/791234" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-5132" }, { "cve": "CVE-2012-5133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5133" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 23.0.1271.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG filters.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5133", "url": "https://www.suse.com/security/cve/CVE-2012-5133" }, { "category": "external", "summary": "SUSE Bug 791234 for CVE-2012-5133", "url": "https://bugzilla.suse.com/791234" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-5133" }, { "cve": "CVE-2012-5134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5134" } ], "notes": [ { "category": "general", "text": "Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5134", "url": "https://www.suse.com/security/cve/CVE-2012-5134" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2012-5134", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 791234 for CVE-2012-5134", "url": "https://bugzilla.suse.com/791234" }, { "category": "external", "summary": "SUSE Bug 793334 for CVE-2012-5134", "url": "https://bugzilla.suse.com/793334" }, { "category": "external", "summary": "SUSE Bug 795039 for CVE-2012-5134", "url": "https://bugzilla.suse.com/795039" }, { "category": "external", "summary": "SUSE Bug 804033 for CVE-2012-5134", "url": "https://bugzilla.suse.com/804033" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-5134" }, { "cve": "CVE-2012-5135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5135" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 23.0.1271.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to printing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5135", "url": "https://www.suse.com/security/cve/CVE-2012-5135" }, { "category": "external", "summary": "SUSE Bug 791234 for CVE-2012-5135", "url": "https://bugzilla.suse.com/791234" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-5135" }, { "cve": "CVE-2012-5136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5136" } ], "notes": [ { "category": "general", "text": "Google Chrome before 23.0.1271.91 does not properly perform a cast of an unspecified variable during handling of the INPUT element, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted HTML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5136", "url": "https://www.suse.com/security/cve/CVE-2012-5136" }, { "category": "external", "summary": "SUSE Bug 791234 for CVE-2012-5136", "url": "https://bugzilla.suse.com/791234" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-5136" }, { "cve": "CVE-2012-5137", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5137" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 23.0.1271.95 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the Media Source API.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5137", "url": "https://www.suse.com/security/cve/CVE-2012-5137" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-5137" }, { "cve": "CVE-2012-5138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5138" } ], "notes": [ { "category": "general", "text": "Google Chrome before 23.0.1271.95 does not properly handle file paths, which has unspecified impact and attack vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5138", "url": "https://www.suse.com/security/cve/CVE-2012-5138" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-5138" }, { "cve": "CVE-2012-5139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5139" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 23.0.1271.97 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to visibility events.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5139", "url": "https://www.suse.com/security/cve/CVE-2012-5139" }, { "category": "external", "summary": "SUSE Bug 794075 for CVE-2012-5139", "url": "https://bugzilla.suse.com/794075" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-5139" }, { "cve": "CVE-2012-5140", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5140" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 23.0.1271.97 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the URL loader.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5140", "url": "https://www.suse.com/security/cve/CVE-2012-5140" }, { "category": "external", "summary": "SUSE Bug 794075 for CVE-2012-5140", "url": "https://bugzilla.suse.com/794075" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-5140" }, { "cve": "CVE-2012-5141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5141" } ], "notes": [ { "category": "general", "text": "Google Chrome before 23.0.1271.97 does not properly restrict instantiation of the Chromoting client plug-in, which has unspecified impact and attack vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5141", "url": "https://www.suse.com/security/cve/CVE-2012-5141" }, { "category": "external", "summary": "SUSE Bug 794075 for CVE-2012-5141", "url": "https://bugzilla.suse.com/794075" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-5141" }, { "cve": "CVE-2012-5142", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5142" } ], "notes": [ { "category": "general", "text": "Google Chrome before 23.0.1271.97 does not properly handle history navigation, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5142", "url": "https://www.suse.com/security/cve/CVE-2012-5142" }, { "category": "external", "summary": "SUSE Bug 794075 for CVE-2012-5142", "url": "https://bugzilla.suse.com/794075" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-5142" }, { "cve": "CVE-2012-5143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5143" } ], "notes": [ { "category": "general", "text": "Integer overflow in Google Chrome before 23.0.1271.97 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to PPAPI image buffers.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5143", "url": "https://www.suse.com/security/cve/CVE-2012-5143" }, { "category": "external", "summary": "SUSE Bug 794075 for CVE-2012-5143", "url": "https://bugzilla.suse.com/794075" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-5143" }, { "cve": "CVE-2012-5144", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5144" } ], "notes": [ { "category": "general", "text": "Google Chrome before 23.0.1271.97, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, do not properly perform AAC decoding, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via vectors related to \"an off-by-one overwrite when switching to LTP profile from MAIN.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5144", "url": "https://www.suse.com/security/cve/CVE-2012-5144" }, { "category": "external", "summary": "SUSE Bug 794075 for CVE-2012-5144", "url": "https://bugzilla.suse.com/794075" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-5144" }, { "cve": "CVE-2012-5145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5145" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG layout.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5145", "url": "https://www.suse.com/security/cve/CVE-2012-5145" }, { "category": "external", "summary": "SUSE Bug 798326 for CVE-2012-5145", "url": "https://bugzilla.suse.com/798326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-5145" }, { "cve": "CVE-2012-5146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5146" } ], "notes": [ { "category": "general", "text": "Google Chrome before 24.0.1312.52 allows remote attackers to bypass the Same Origin Policy via a malformed URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5146", "url": "https://www.suse.com/security/cve/CVE-2012-5146" }, { "category": "external", "summary": "SUSE Bug 798326 for CVE-2012-5146", "url": "https://bugzilla.suse.com/798326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-5146" }, { "cve": "CVE-2012-5147", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5147" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOM handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5147", "url": "https://www.suse.com/security/cve/CVE-2012-5147" }, { "category": "external", "summary": "SUSE Bug 798326 for CVE-2012-5147", "url": "https://bugzilla.suse.com/798326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-5147" }, { "cve": "CVE-2012-5148", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5148" } ], "notes": [ { "category": "general", "text": "The hyphenation functionality in Google Chrome before 24.0.1312.52 does not properly validate file names, which has unspecified impact and attack vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5148", "url": "https://www.suse.com/security/cve/CVE-2012-5148" }, { "category": "external", "summary": "SUSE Bug 798326 for CVE-2012-5148", "url": "https://bugzilla.suse.com/798326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-5148" }, { "cve": "CVE-2012-5149", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5149" } ], "notes": [ { "category": "general", "text": "Integer overflow in the audio IPC layer in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5149", "url": "https://www.suse.com/security/cve/CVE-2012-5149" }, { "category": "external", "summary": "SUSE Bug 798326 for CVE-2012-5149", "url": "https://bugzilla.suse.com/798326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-5149" }, { "cve": "CVE-2012-5150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5150" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving seek operations on video data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5150", "url": "https://www.suse.com/security/cve/CVE-2012-5150" }, { "category": "external", "summary": "SUSE Bug 798326 for CVE-2012-5150", "url": "https://bugzilla.suse.com/798326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-5150" }, { "cve": "CVE-2012-5152", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5152" } ], "notes": [ { "category": "general", "text": "Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving seek operations on video data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5152", "url": "https://www.suse.com/security/cve/CVE-2012-5152" }, { "category": "external", "summary": "SUSE Bug 798326 for CVE-2012-5152", "url": "https://bugzilla.suse.com/798326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-5152" }, { "cve": "CVE-2012-5153", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5153" } ], "notes": [ { "category": "general", "text": "Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds access to stack memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5153", "url": "https://www.suse.com/security/cve/CVE-2012-5153" }, { "category": "external", "summary": "SUSE Bug 798326 for CVE-2012-5153", "url": "https://bugzilla.suse.com/798326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-5153" }, { "cve": "CVE-2012-5154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5154" } ], "notes": [ { "category": "general", "text": "Integer overflow in Google Chrome before 24.0.1312.52 on Windows allows attackers to cause a denial of service or possibly have unspecified other impact via vectors related to allocation of shared memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5154", "url": "https://www.suse.com/security/cve/CVE-2012-5154" }, { "category": "external", "summary": "SUSE Bug 798326 for CVE-2012-5154", "url": "https://bugzilla.suse.com/798326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-5154" }, { "cve": "CVE-2013-0830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0830" } ], "notes": [ { "category": "general", "text": "The IPC layer in Google Chrome before 24.0.1312.52 on Windows omits a NUL character required for termination of an unspecified data structure, which has unknown impact and attack vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0830", "url": "https://www.suse.com/security/cve/CVE-2013-0830" }, { "category": "external", "summary": "SUSE Bug 798326 for CVE-2013-0830", "url": "https://bugzilla.suse.com/798326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0830" }, { "cve": "CVE-2013-0831", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0831" } ], "notes": [ { "category": "general", "text": "Directory traversal vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to have an unspecified impact by leveraging access to an extension process.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0831", "url": "https://www.suse.com/security/cve/CVE-2013-0831" }, { "category": "external", "summary": "SUSE Bug 798326 for CVE-2013-0831", "url": "https://bugzilla.suse.com/798326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0831" }, { "cve": "CVE-2013-0832", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0832" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to printing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0832", "url": "https://www.suse.com/security/cve/CVE-2013-0832" }, { "category": "external", "summary": "SUSE Bug 798326 for CVE-2013-0832", "url": "https://bugzilla.suse.com/798326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0832" }, { "cve": "CVE-2013-0833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0833" } ], "notes": [ { "category": "general", "text": "Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to printing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0833", "url": "https://www.suse.com/security/cve/CVE-2013-0833" }, { "category": "external", "summary": "SUSE Bug 798326 for CVE-2013-0833", "url": "https://bugzilla.suse.com/798326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0833" }, { "cve": "CVE-2013-0834", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0834" } ], "notes": [ { "category": "general", "text": "Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving glyphs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0834", "url": "https://www.suse.com/security/cve/CVE-2013-0834" }, { "category": "external", "summary": "SUSE Bug 798326 for CVE-2013-0834", "url": "https://bugzilla.suse.com/798326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0834" }, { "cve": "CVE-2013-0835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0835" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in the Geolocation implementation in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service (application crash) via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0835", "url": "https://www.suse.com/security/cve/CVE-2013-0835" }, { "category": "external", "summary": "SUSE Bug 798326 for CVE-2013-0835", "url": "https://bugzilla.suse.com/798326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0835" }, { "cve": "CVE-2013-0836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0836" } ], "notes": [ { "category": "general", "text": "Google V8 before 3.14.5.3, as used in Google Chrome before 24.0.1312.52, does not properly implement garbage collection, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0836", "url": "https://www.suse.com/security/cve/CVE-2013-0836" }, { "category": "external", "summary": "SUSE Bug 798326 for CVE-2013-0836", "url": "https://bugzilla.suse.com/798326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0836" }, { "cve": "CVE-2013-0837", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0837" } ], "notes": [ { "category": "general", "text": "Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of extension tabs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0837", "url": "https://www.suse.com/security/cve/CVE-2013-0837" }, { "category": "external", "summary": "SUSE Bug 798326 for CVE-2013-0837", "url": "https://bugzilla.suse.com/798326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0837" }, { "cve": "CVE-2013-0838", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0838" } ], "notes": [ { "category": "general", "text": "Google Chrome before 24.0.1312.52 on Linux uses weak permissions for shared memory segments, which has unspecified impact and attack vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0838", "url": "https://www.suse.com/security/cve/CVE-2013-0838" }, { "category": "external", "summary": "SUSE Bug 798326 for CVE-2013-0838", "url": "https://bugzilla.suse.com/798326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0838" }, { "cve": "CVE-2013-0879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0879" } ], "notes": [ { "category": "general", "text": "Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly implement web audio nodes, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0879", "url": "https://www.suse.com/security/cve/CVE-2013-0879" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0879", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0879" }, { "cve": "CVE-2013-0880", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0880" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to databases.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0880", "url": "https://www.suse.com/security/cve/CVE-2013-0880" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0880", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0880" }, { "cve": "CVE-2013-0881", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0881" } ], "notes": [ { "category": "general", "text": "Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service (incorrect read operation) via crafted data in the Matroska container format.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0881", "url": "https://www.suse.com/security/cve/CVE-2013-0881" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0881", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0881" }, { "cve": "CVE-2013-0882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0882" } ], "notes": [ { "category": "general", "text": "Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service (incorrect memory access) or possibly have unspecified other impact via a large number of SVG parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0882", "url": "https://www.suse.com/security/cve/CVE-2013-0882" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0882", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0882" }, { "cve": "CVE-2013-0883", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0883" } ], "notes": [ { "category": "general", "text": "Skia, as used in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service (incorrect read operation) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0883", "url": "https://www.suse.com/security/cve/CVE-2013-0883" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0883", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0883" }, { "cve": "CVE-2013-0884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0884" } ], "notes": [ { "category": "general", "text": "Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly load Native Client (aka NaCl) code, which has unspecified impact and attack vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0884", "url": "https://www.suse.com/security/cve/CVE-2013-0884" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0884", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0884" }, { "cve": "CVE-2013-0885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0885" } ], "notes": [ { "category": "general", "text": "Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly restrict API privileges during interaction with the Chrome Web Store, which has unspecified impact and attack vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0885", "url": "https://www.suse.com/security/cve/CVE-2013-0885" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0885", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0885" }, { "cve": "CVE-2013-0886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0886" } ], "notes": [ { "category": "general", "text": "Google Chrome before 25.0.1364.99 on Mac OS X does not properly implement signal handling for Native Client (aka NaCl) code, which has unspecified impact and attack vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0886", "url": "https://www.suse.com/security/cve/CVE-2013-0886" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0886", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0886" }, { "cve": "CVE-2013-0887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0887" } ], "notes": [ { "category": "general", "text": "The developer-tools process in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly restrict privileges during interaction with a connected server, which has unspecified impact and attack vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0887", "url": "https://www.suse.com/security/cve/CVE-2013-0887" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0887", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0887" }, { "cve": "CVE-2013-0888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0888" } ], "notes": [ { "category": "general", "text": "Skia, as used in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to a \"user gesture check for dangerous file downloads.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0888", "url": "https://www.suse.com/security/cve/CVE-2013-0888" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0888", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0888" }, { "cve": "CVE-2013-0889", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0889" } ], "notes": [ { "category": "general", "text": "Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly enforce a user gesture requirement before proceeding with a file download, which might make it easier for remote attackers to execute arbitrary code via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0889", "url": "https://www.suse.com/security/cve/CVE-2013-0889" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0889", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0889" }, { "cve": "CVE-2013-0890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0890" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in the IPC layer in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allow remote attackers to cause a denial of service (memory corruption) or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0890", "url": "https://www.suse.com/security/cve/CVE-2013-0890" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0890", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0890" }, { "cve": "CVE-2013-0891", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0891" } ], "notes": [ { "category": "general", "text": "Integer overflow in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a blob.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0891", "url": "https://www.suse.com/security/cve/CVE-2013-0891" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0891", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0891" }, { "cve": "CVE-2013-0892", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0892" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in the IPC layer in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allow remote attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0892", "url": "https://www.suse.com/security/cve/CVE-2013-0892" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0892", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0892" }, { "cve": "CVE-2013-0893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0893" } ], "notes": [ { "category": "general", "text": "Race condition in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to media.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0893", "url": "https://www.suse.com/security/cve/CVE-2013-0893" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0893", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0893" }, { "cve": "CVE-2013-0894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0894" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the vorbis_parse_setup_hdr_floors function in the Vorbis decoder in vorbisdec.c in libavcodec in FFmpeg through 1.1.3, as used in Google Chrome before 25.0.1364.97 on Windows and Linux and before 25.0.1364.99 on Mac OS X and other products, allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds array access) or possibly have unspecified other impact via vectors involving a zero value for a bark map size.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0894", "url": "https://www.suse.com/security/cve/CVE-2013-0894" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0894", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0894" }, { "cve": "CVE-2013-0895", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0895" } ], "notes": [ { "category": "general", "text": "Google Chrome before 25.0.1364.97 on Linux, and before 25.0.1364.99 on Mac OS X, does not properly handle pathnames during copy operations, which might make it easier for remote attackers to execute arbitrary programs via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0895", "url": "https://www.suse.com/security/cve/CVE-2013-0895" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0895", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0895" }, { "cve": "CVE-2013-0896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0896" } ], "notes": [ { "category": "general", "text": "Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly manage memory during message handling for plug-ins, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0896", "url": "https://www.suse.com/security/cve/CVE-2013-0896" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0896", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0896" }, { "cve": "CVE-2013-0897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0897" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the PDF functionality in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service via a crafted document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0897", "url": "https://www.suse.com/security/cve/CVE-2013-0897" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0897", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0897" }, { "cve": "CVE-2013-0898", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0898" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0898", "url": "https://www.suse.com/security/cve/CVE-2013-0898" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0898", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-0898" }, { "cve": "CVE-2013-0899", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0899" } ], "notes": [ { "category": "general", "text": "Integer overflow in the padding implementation in the opus_packet_parse_impl function in src/opus_decoder.c in Opus before 1.0.2, as used in Google Chrome before 25.0.1364.97 on Windows and Linux and before 25.0.1364.99 on Mac OS X and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a long packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0899", "url": "https://www.suse.com/security/cve/CVE-2013-0899" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0899", "url": "https://bugzilla.suse.com/804986" }, { "category": "external", "summary": "SUSE Bug 830356 for CVE-2013-0899", "url": "https://bugzilla.suse.com/830356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0899" }, { "cve": "CVE-2013-0900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0900" } ], "notes": [ { "category": "general", "text": "Race condition in the International Components for Unicode (ICU) functionality in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0900", "url": "https://www.suse.com/security/cve/CVE-2013-0900" }, { "category": "external", "summary": "SUSE Bug 804986 for CVE-2013-0900", "url": "https://bugzilla.suse.com/804986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0900" }, { "cve": "CVE-2013-2838", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2838" } ], "notes": [ { "category": "general", "text": "Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2838", "url": "https://www.suse.com/security/cve/CVE-2013-2838" }, { "category": "external", "summary": "SUSE Bug 821601 for CVE-2013-2838", "url": "https://bugzilla.suse.com/821601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-2838" }, { "cve": "CVE-2013-2906", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2906" } ], "notes": [ { "category": "general", "text": "Multiple race conditions in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to threading in core/html/HTMLMediaElement.cpp, core/platform/audio/AudioDSPKernelProcessor.cpp, core/platform/audio/HRTFElevation.cpp, and modules/webaudio/ConvolverNode.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2906", "url": "https://www.suse.com/security/cve/CVE-2013-2906" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2906", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-2906" }, { "cve": "CVE-2013-2907", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2907" } ], "notes": [ { "category": "general", "text": "The Window.prototype object implementation in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2907", "url": "https://www.suse.com/security/cve/CVE-2013-2907" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2907", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-2907" }, { "cve": "CVE-2013-2908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2908" } ], "notes": [ { "category": "general", "text": "Google Chrome before 30.0.1599.66 uses incorrect function calls to determine the values of NavigationEntry objects, which allows remote attackers to spoof the address bar via vectors involving a response with a 204 (aka No Content) status code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2908", "url": "https://www.suse.com/security/cve/CVE-2013-2908" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2908", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-2908" }, { "cve": "CVE-2013-2909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2909" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to inline-block rendering for bidirectional Unicode text in an element isolated from its siblings.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2909", "url": "https://www.suse.com/security/cve/CVE-2013-2909" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2909", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2909" }, { "cve": "CVE-2013-2910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2910" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in modules/webaudio/AudioScheduledSourceNode.cpp in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2910", "url": "https://www.suse.com/security/cve/CVE-2013-2910" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2910", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2910" }, { "cve": "CVE-2013-2911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2911" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the XSLStyleSheet::compileStyleSheet function in core/xml/XSLStyleSheetLibxslt.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of post-failure recompilation in unspecified libxslt versions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2911", "url": "https://www.suse.com/security/cve/CVE-2013-2911" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2911", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-2911" }, { "cve": "CVE-2013-2912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2912" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the PepperInProcessRouter::SendToHost function in content/renderer/pepper/pepper_in_process_router.cc in the Pepper Plug-in API (PPAPI) in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a resource-destruction message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2912", "url": "https://www.suse.com/security/cve/CVE-2013-2912" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2912", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2912" }, { "cve": "CVE-2013-2913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2913" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the XMLDocumentParser::append function in core/xml/parser/XMLDocumentParser.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving an XML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2913", "url": "https://www.suse.com/security/cve/CVE-2013-2913" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2913", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-2913" }, { "cve": "CVE-2013-2914", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2914" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the color-chooser dialog in Google Chrome before 30.0.1599.66 on Windows allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to color_chooser_dialog.cc and color_chooser_win.cc in browser/ui/views/.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2914", "url": "https://www.suse.com/security/cve/CVE-2013-2914" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2914", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-2914" }, { "cve": "CVE-2013-2915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2915" } ], "notes": [ { "category": "general", "text": "Google Chrome before 30.0.1599.66 preserves pending NavigationEntry objects in certain invalid circumstances, which allows remote attackers to spoof the address bar via a URL with a malformed scheme, as demonstrated by a nonexistent:12121 URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2915", "url": "https://www.suse.com/security/cve/CVE-2013-2915" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2915", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-2915" }, { "cve": "CVE-2013-2916", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2916" } ], "notes": [ { "category": "general", "text": "Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to spoof the address bar via vectors involving a response with a 204 (aka No Content) status code, in conjunction with a delay in notifying the user of an attempted spoof.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2916", "url": "https://www.suse.com/security/cve/CVE-2013-2916" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2916", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-2916" }, { "cve": "CVE-2013-2917", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2917" } ], "notes": [ { "category": "general", "text": "The ReverbConvolverStage::ReverbConvolverStage function in core/platform/audio/ReverbConvolverStage.cpp in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the impulseResponse array.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2917", "url": "https://www.suse.com/security/cve/CVE-2013-2917" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2917", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-2917" }, { "cve": "CVE-2013-2918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2918" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the RenderBlock::collapseAnonymousBlockChild function in core/rendering/RenderBlock.cpp in the DOM implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect handling of parent-child relationships for anonymous blocks.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2918", "url": "https://www.suse.com/security/cve/CVE-2013-2918" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2918", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2918" }, { "cve": "CVE-2013-2919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2919" } ], "notes": [ { "category": "general", "text": "Google V8, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2919", "url": "https://www.suse.com/security/cve/CVE-2013-2919" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2919", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2919" }, { "cve": "CVE-2013-2920", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2920" } ], "notes": [ { "category": "general", "text": "The DoResolveRelativeHost function in url/url_canon_relative.cc in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service (out-of-bounds read) via a relative URL containing a hostname, as demonstrated by a protocol-relative URL beginning with a //www.google.com/ substring.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2920", "url": "https://www.suse.com/security/cve/CVE-2013-2920" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2920", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-2920" }, { "cve": "CVE-2013-2921", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2921" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the ResourceFetcher::didLoadResource function in core/fetch/ResourceFetcher.cpp in the resource loader in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering certain callback processing during the reporting of a resource entry.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2921", "url": "https://www.suse.com/security/cve/CVE-2013-2921" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2921", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-2921" }, { "cve": "CVE-2013-2922", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2922" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in core/html/HTMLTemplateElement.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that operates on a TEMPLATE element.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2922", "url": "https://www.suse.com/security/cve/CVE-2013-2922" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2922", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-2922" }, { "cve": "CVE-2013-2923", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2923" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 30.0.1599.66 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2923", "url": "https://www.suse.com/security/cve/CVE-2013-2923" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2923", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2923" }, { "cve": "CVE-2013-2924", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2924" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in International Components for Unicode (ICU), as used in Google Chrome before 30.0.1599.66 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2924", "url": "https://www.suse.com/security/cve/CVE-2013-2924" }, { "category": "external", "summary": "SUSE Bug 844084 for CVE-2013-2924", "url": "https://bugzilla.suse.com/844084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2924" }, { "cve": "CVE-2013-2925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2925" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in core/xml/XMLHttpRequest.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger multiple conflicting uses of the same XMLHttpRequest object.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2925", "url": "https://www.suse.com/security/cve/CVE-2013-2925" }, { "category": "external", "summary": "SUSE Bug 846444 for CVE-2013-2925", "url": "https://bugzilla.suse.com/846444" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2925" }, { "cve": "CVE-2013-2926", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2926" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the IndentOutdentCommand::tryIndentingAsListItem function in core/editing/IndentOutdentCommand.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to list elements.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2926", "url": "https://www.suse.com/security/cve/CVE-2013-2926" }, { "category": "external", "summary": "SUSE Bug 846444 for CVE-2013-2926", "url": "https://bugzilla.suse.com/846444" }, { "category": "external", "summary": "SUSE Bug 871792 for CVE-2013-2926", "url": "https://bugzilla.suse.com/871792" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-2926" }, { "cve": "CVE-2013-2927", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2927" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the HTMLFormElement::prepareForSubmission function in core/html/HTMLFormElement.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to submission for FORM elements.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2927", "url": "https://www.suse.com/security/cve/CVE-2013-2927" }, { "category": "external", "summary": "SUSE Bug 846444 for CVE-2013-2927", "url": "https://bugzilla.suse.com/846444" }, { "category": "external", "summary": "SUSE Bug 879607 for CVE-2013-2927", "url": "https://bugzilla.suse.com/879607" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-2927" }, { "cve": "CVE-2013-2928", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2928" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 30.0.1599.101 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2928", "url": "https://www.suse.com/security/cve/CVE-2013-2928" }, { "category": "external", "summary": "SUSE Bug 846444 for CVE-2013-2928", "url": "https://bugzilla.suse.com/846444" }, { "category": "external", "summary": "SUSE Bug 871792 for CVE-2013-2928", "url": "https://bugzilla.suse.com/871792" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2928" }, { "cve": "CVE-2013-2931", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2931" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 31.0.1650.48 allow attackers to execute arbitrary code or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2931", "url": "https://www.suse.com/security/cve/CVE-2013-2931" }, { "category": "external", "summary": "SUSE Bug 850430 for CVE-2013-2931", "url": "https://bugzilla.suse.com/850430" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2931" }, { "cve": "CVE-2013-6621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6621" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the x-webkit-speech attribute in a text INPUT element.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6621", "url": "https://www.suse.com/security/cve/CVE-2013-6621" }, { "category": "external", "summary": "SUSE Bug 850430 for CVE-2013-6621", "url": "https://bugzilla.suse.com/850430" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6621" }, { "cve": "CVE-2013-6622", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6622" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the HTMLMediaElement::didMoveToNewDocument function in core/html/HTMLMediaElement.cpp in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the movement of a media element between documents.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6622", "url": "https://www.suse.com/security/cve/CVE-2013-6622" }, { "category": "external", "summary": "SUSE Bug 850430 for CVE-2013-6622", "url": "https://bugzilla.suse.com/850430" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6622" }, { "cve": "CVE-2013-6623", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6623" } ], "notes": [ { "category": "general", "text": "The SVG implementation in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service (out-of-bounds read) by leveraging the use of tree order, rather than transitive dependency order, for layout.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6623", "url": "https://www.suse.com/security/cve/CVE-2013-6623" }, { "category": "external", "summary": "SUSE Bug 850430 for CVE-2013-6623", "url": "https://bugzilla.suse.com/850430" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6623" }, { "cve": "CVE-2013-6624", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6624" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the string values of id attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6624", "url": "https://www.suse.com/security/cve/CVE-2013-6624" }, { "category": "external", "summary": "SUSE Bug 850430 for CVE-2013-6624", "url": "https://bugzilla.suse.com/850430" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6624" }, { "cve": "CVE-2013-6625", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6625" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of DOM range objects in circumstances that require child node removal after a (1) mutation or (2) blur event.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6625", "url": "https://www.suse.com/security/cve/CVE-2013-6625" }, { "category": "external", "summary": "SUSE Bug 850430 for CVE-2013-6625", "url": "https://bugzilla.suse.com/850430" }, { "category": "external", "summary": "SUSE Bug 871792 for CVE-2013-6625", "url": "https://bugzilla.suse.com/871792" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6625" }, { "cve": "CVE-2013-6626", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6626" } ], "notes": [ { "category": "general", "text": "The WebContentsImpl::AttachInterstitialPage function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 31.0.1650.48 does not cancel JavaScript dialogs upon generating an interstitial warning, which allows remote attackers to spoof the address bar via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6626", "url": "https://www.suse.com/security/cve/CVE-2013-6626" }, { "category": "external", "summary": "SUSE Bug 850430 for CVE-2013-6626", "url": "https://bugzilla.suse.com/850430" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6626" }, { "cve": "CVE-2013-6627", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6627" } ], "notes": [ { "category": "general", "text": "net/http/http_stream_parser.cc in Google Chrome before 31.0.1650.48 does not properly process HTTP Informational (aka 1xx) status codes, which allows remote web servers to cause a denial of service (out-of-bounds read) via a crafted response.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6627", "url": "https://www.suse.com/security/cve/CVE-2013-6627" }, { "category": "external", "summary": "SUSE Bug 850430 for CVE-2013-6627", "url": "https://bugzilla.suse.com/850430" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6627" }, { "cve": "CVE-2013-6628", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6628" } ], "notes": [ { "category": "general", "text": "net/socket/ssl_client_socket_nss.cc in the TLS implementation in Google Chrome before 31.0.1650.48 does not ensure that a server\u0027s X.509 certificate is the same during renegotiation as it was before renegotiation, which might allow remote web servers to interfere with trust relationships by renegotiating a session.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6628", "url": "https://www.suse.com/security/cve/CVE-2013-6628" }, { "category": "external", "summary": "SUSE Bug 850430 for CVE-2013-6628", "url": "https://bugzilla.suse.com/850430" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6628" }, { "cve": "CVE-2013-6629", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6629" } ], "notes": [ { "category": "general", "text": "The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6629", "url": "https://www.suse.com/security/cve/CVE-2013-6629" }, { "category": "external", "summary": "SUSE Bug 850430 for CVE-2013-6629", "url": "https://bugzilla.suse.com/850430" }, { "category": "external", "summary": "SUSE Bug 873872 for CVE-2013-6629", "url": "https://bugzilla.suse.com/873872" }, { "category": "external", "summary": "SUSE Bug 873873 for CVE-2013-6629", "url": "https://bugzilla.suse.com/873873" }, { "category": "external", "summary": "SUSE Bug 877429 for CVE-2013-6629", "url": "https://bugzilla.suse.com/877429" }, { "category": "external", "summary": "SUSE Bug 877430 for CVE-2013-6629", "url": "https://bugzilla.suse.com/877430" }, { "category": "external", "summary": "SUSE Bug 880246 for CVE-2013-6629", "url": "https://bugzilla.suse.com/880246" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6629" }, { "cve": "CVE-2013-6630", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6630" } ], "notes": [ { "category": "general", "text": "The get_dht function in jdmarker.c in libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48 and other products, does not set all elements of a certain Huffman value array during the reading of segments that follow Define Huffman Table (DHT) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6630", "url": "https://www.suse.com/security/cve/CVE-2013-6630" }, { "category": "external", "summary": "SUSE Bug 850430 for CVE-2013-6630", "url": "https://bugzilla.suse.com/850430" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6630" }, { "cve": "CVE-2013-6631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6631" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome before 31.0.1650.48 and other products, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger the absence of certain statistics initialization, leading to the skipping of a required DeRegisterExternalTransport call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6631", "url": "https://www.suse.com/security/cve/CVE-2013-6631" }, { "category": "external", "summary": "SUSE Bug 850430 for CVE-2013-6631", "url": "https://bugzilla.suse.com/850430" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6631" }, { "cve": "CVE-2013-6632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6632" } ], "notes": [ { "category": "general", "text": "Integer overflow in Google Chrome before 31.0.1650.57 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as demonstrated during a Mobile Pwn2Own competition at PacSec 2013.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6632", "url": "https://www.suse.com/security/cve/CVE-2013-6632" }, { "category": "external", "summary": "SUSE Bug 850430 for CVE-2013-6632", "url": "https://bugzilla.suse.com/850430" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2013-6632" }, { "cve": "CVE-2013-6634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6634" } ], "notes": [ { "category": "general", "text": "The OneClickSigninHelper::ShowInfoBarIfPossible function in browser/ui/sync/one_click_signin_helper.cc in Google Chrome before 31.0.1650.63 uses an incorrect URL during realm validation, which allows remote attackers to conduct session fixation attacks and hijack web sessions by triggering improper sync after a 302 (aka Found) HTTP status code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6634", "url": "https://www.suse.com/security/cve/CVE-2013-6634" }, { "category": "external", "summary": "SUSE Bug 854472 for CVE-2013-6634", "url": "https://bugzilla.suse.com/854472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6634" }, { "cve": "CVE-2013-6635", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6635" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the editing implementation in Blink, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via JavaScript code that triggers removal of a node during processing of the DOM tree, related to CompositeEditCommand.cpp and ReplaceSelectionCommand.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6635", "url": "https://www.suse.com/security/cve/CVE-2013-6635" }, { "category": "external", "summary": "SUSE Bug 854472 for CVE-2013-6635", "url": "https://bugzilla.suse.com/854472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6635" }, { "cve": "CVE-2013-6636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6636" } ], "notes": [ { "category": "general", "text": "The FrameLoader::notifyIfInitialDocumentAccessed function in core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 31.0.1650.63, makes an incorrect check for an empty document during presentation of a modal dialog, which allows remote attackers to spoof the address bar via vectors involving the document.write method.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6636", "url": "https://www.suse.com/security/cve/CVE-2013-6636" }, { "category": "external", "summary": "SUSE Bug 854472 for CVE-2013-6636", "url": "https://bugzilla.suse.com/854472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6636" }, { "cve": "CVE-2013-6637", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6637" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 31.0.1650.63 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6637", "url": "https://www.suse.com/security/cve/CVE-2013-6637" }, { "category": "external", "summary": "SUSE Bug 854472 for CVE-2013-6637", "url": "https://bugzilla.suse.com/854472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6637" }, { "cve": "CVE-2013-6638", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6638" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6638", "url": "https://www.suse.com/security/cve/CVE-2013-6638" }, { "category": "external", "summary": "SUSE Bug 854473 for CVE-2013-6638", "url": "https://bugzilla.suse.com/854473" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6638" }, { "cve": "CVE-2013-6639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6639" } ], "notes": [ { "category": "general", "text": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6639", "url": "https://www.suse.com/security/cve/CVE-2013-6639" }, { "category": "external", "summary": "SUSE Bug 854473 for CVE-2013-6639", "url": "https://bugzilla.suse.com/854473" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6639" }, { "cve": "CVE-2013-6640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6640" } ], "notes": [ { "category": "general", "text": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6640", "url": "https://www.suse.com/security/cve/CVE-2013-6640" }, { "category": "external", "summary": "SUSE Bug 854473 for CVE-2013-6640", "url": "https://bugzilla.suse.com/854473" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6640" }, { "cve": "CVE-2013-6641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6641" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the FormAssociatedElement::formRemovedFromTree function in core/html/FormAssociatedElement.cpp in Blink, as used in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of the past names map of a FORM element.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6641", "url": "https://www.suse.com/security/cve/CVE-2013-6641" }, { "category": "external", "summary": "SUSE Bug 861013 for CVE-2013-6641", "url": "https://bugzilla.suse.com/861013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6641" }, { "cve": "CVE-2013-6643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6643" } ], "notes": [ { "category": "general", "text": "The OneClickSigninBubbleView::WindowClosing function in browser/ui/views/sync/one_click_signin_bubble_view.cc in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows attackers to trigger a sync with an arbitrary Google account by leveraging improper handling of the closing of an untrusted signin confirm dialog.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6643", "url": "https://www.suse.com/security/cve/CVE-2013-6643" }, { "category": "external", "summary": "SUSE Bug 861013 for CVE-2013-6643", "url": "https://bugzilla.suse.com/861013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6643" }, { "cve": "CVE-2013-6644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6644" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6644", "url": "https://www.suse.com/security/cve/CVE-2013-6644" }, { "category": "external", "summary": "SUSE Bug 861013 for CVE-2013-6644", "url": "https://bugzilla.suse.com/861013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6644" }, { "cve": "CVE-2013-6645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6645" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the OnWindowRemovingFromRootWindow function in content/browser/web_contents/web_contents_view_aura.cc in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving certain print-preview and tab-switch actions that interact with a speech input element.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6645", "url": "https://www.suse.com/security/cve/CVE-2013-6645" }, { "category": "external", "summary": "SUSE Bug 861013 for CVE-2013-6645", "url": "https://bugzilla.suse.com/861013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6645" }, { "cve": "CVE-2013-6646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6646" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the Web Workers implementation in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the shutting down of a worker process.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6646", "url": "https://www.suse.com/security/cve/CVE-2013-6646" }, { "category": "external", "summary": "SUSE Bug 861013 for CVE-2013-6646", "url": "https://bugzilla.suse.com/861013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6646" }, { "cve": "CVE-2013-6649", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6649" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the RenderSVGImage::paint function in core/rendering/svg/RenderSVGImage.cpp in Blink, as used in Google Chrome before 32.0.1700.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a zero-size SVG image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6649", "url": "https://www.suse.com/security/cve/CVE-2013-6649" }, { "category": "external", "summary": "SUSE Bug 861013 for CVE-2013-6649", "url": "https://bugzilla.suse.com/861013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6649" }, { "cve": "CVE-2013-6650", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6650" } ], "notes": [ { "category": "general", "text": "The StoreBuffer::ExemptPopularPages function in store-buffer.cc in Google V8 before 3.22.24.16, as used in Google Chrome before 32.0.1700.102, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors that trigger incorrect handling of \"popular pages.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6650", "url": "https://www.suse.com/security/cve/CVE-2013-6650" }, { "category": "external", "summary": "SUSE Bug 861013 for CVE-2013-6650", "url": "https://bugzilla.suse.com/861013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6650" }, { "cve": "CVE-2013-6653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6653" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the web contents implementation in Google Chrome before 33.0.1750.117 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving attempted conflicting access to the color chooser.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6653", "url": "https://www.suse.com/security/cve/CVE-2013-6653" }, { "category": "external", "summary": "SUSE Bug 865500 for CVE-2013-6653", "url": "https://bugzilla.suse.com/865500" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6653" }, { "cve": "CVE-2013-6654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6654" } ], "notes": [ { "category": "general", "text": "The SVGAnimateElement::calculateAnimatedValue function in core/svg/SVGAnimateElement.cpp in Blink, as used in Google Chrome before 33.0.1750.117, does not properly handle unexpected data types, which allows remote attackers to cause a denial of service (incorrect cast) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6654", "url": "https://www.suse.com/security/cve/CVE-2013-6654" }, { "category": "external", "summary": "SUSE Bug 865500 for CVE-2013-6654", "url": "https://bugzilla.suse.com/865500" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6654" }, { "cve": "CVE-2013-6655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6655" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Blink, as used in Google Chrome before 33.0.1750.117, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to improper handling of overflowchanged DOM events during interaction between JavaScript and layout.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6655", "url": "https://www.suse.com/security/cve/CVE-2013-6655" }, { "category": "external", "summary": "SUSE Bug 865500 for CVE-2013-6655", "url": "https://bugzilla.suse.com/865500" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6655" }, { "cve": "CVE-2013-6656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6656" } ], "notes": [ { "category": "general", "text": "The XSSAuditor::init function in core/html/parser/XSSAuditor.cpp in the XSS auditor in Blink, as used in Google Chrome before 33.0.1750.117, processes POST requests by using the body of a redirecting page instead of the body of a redirect target, which allows remote attackers to obtain sensitive information via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6656", "url": "https://www.suse.com/security/cve/CVE-2013-6656" }, { "category": "external", "summary": "SUSE Bug 865500 for CVE-2013-6656", "url": "https://bugzilla.suse.com/865500" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6656" }, { "cve": "CVE-2013-6657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6657" } ], "notes": [ { "category": "general", "text": "core/html/parser/XSSAuditor.cpp in the XSS auditor in Blink, as used in Google Chrome before 33.0.1750.117, inserts the about:blank URL during certain blocking of FORM elements within HTTP requests, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6657", "url": "https://www.suse.com/security/cve/CVE-2013-6657" }, { "category": "external", "summary": "SUSE Bug 865500 for CVE-2013-6657", "url": "https://bugzilla.suse.com/865500" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6657" }, { "cve": "CVE-2013-6658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6658" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in the layout implementation in Blink, as used in Google Chrome before 33.0.1750.117, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving (1) running JavaScript code during execution of the updateWidgetPositions function or (2) making a call into a plugin during execution of the updateWidgetPositions function.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6658", "url": "https://www.suse.com/security/cve/CVE-2013-6658" }, { "category": "external", "summary": "SUSE Bug 865500 for CVE-2013-6658", "url": "https://bugzilla.suse.com/865500" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6658" }, { "cve": "CVE-2013-6659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6659" } ], "notes": [ { "category": "general", "text": "The SSLClientSocketNSS::Core::OwnAuthCertHandler function in net/socket/ssl_client_socket_nss.cc in Google Chrome before 33.0.1750.117 does not prevent changes to server X.509 certificates during renegotiations, which allows remote SSL servers to trigger use of a new certificate chain, inconsistent with the user\u0027s expectations, by initiating a TLS renegotiation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6659", "url": "https://www.suse.com/security/cve/CVE-2013-6659" }, { "category": "external", "summary": "SUSE Bug 865500 for CVE-2013-6659", "url": "https://bugzilla.suse.com/865500" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6659" }, { "cve": "CVE-2013-6660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6660" } ], "notes": [ { "category": "general", "text": "The drag-and-drop implementation in Google Chrome before 33.0.1750.117 does not properly restrict the information in WebDropData data structures, which allows remote attackers to discover full pathnames via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6660", "url": "https://www.suse.com/security/cve/CVE-2013-6660" }, { "category": "external", "summary": "SUSE Bug 865500 for CVE-2013-6660", "url": "https://bugzilla.suse.com/865500" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6660" }, { "cve": "CVE-2013-6661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6661" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 33.0.1750.117 allow attackers to bypass the sandbox protection mechanism after obtaining renderer access, or have other impact, via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6661", "url": "https://www.suse.com/security/cve/CVE-2013-6661" }, { "category": "external", "summary": "SUSE Bug 865500 for CVE-2013-6661", "url": "https://bugzilla.suse.com/865500" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6661" }, { "cve": "CVE-2014-0574", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0574" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK \u0026 Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0574", "url": "https://www.suse.com/security/cve/CVE-2014-0574" }, { "category": "external", "summary": "SUSE Bug 905032 for CVE-2014-0574", "url": "https://bugzilla.suse.com/905032" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2014-0574" }, { "cve": "CVE-2014-1700", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1700" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in modules/speech/SpeechSynthesis.cpp in Blink, as used in Google Chrome before 33.0.1750.149, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of a certain utterance data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1700", "url": "https://www.suse.com/security/cve/CVE-2014-1700" }, { "category": "external", "summary": "SUSE Bug 866959 for CVE-2014-1700", "url": "https://bugzilla.suse.com/866959" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1700" }, { "cve": "CVE-2014-1701", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1701" } ], "notes": [ { "category": "general", "text": "The GenerateFunction function in bindings/scripts/code_generator_v8.pm in Blink, as used in Google Chrome before 33.0.1750.149, does not implement a certain cross-origin restriction for the EventTarget::dispatchEvent function, which allows remote attackers to conduct Universal XSS (UXSS) attacks via vectors involving events.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1701", "url": "https://www.suse.com/security/cve/CVE-2014-1701" }, { "category": "external", "summary": "SUSE Bug 866959 for CVE-2014-1701", "url": "https://bugzilla.suse.com/866959" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-1701" }, { "cve": "CVE-2014-1702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1702" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the DatabaseThread::cleanupDatabaseThread function in modules/webdatabase/DatabaseThread.cpp in the web database implementation in Blink, as used in Google Chrome before 33.0.1750.149, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of scheduled tasks during shutdown of a thread.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1702", "url": "https://www.suse.com/security/cve/CVE-2014-1702" }, { "category": "external", "summary": "SUSE Bug 866959 for CVE-2014-1702", "url": "https://bugzilla.suse.com/866959" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1702" }, { "cve": "CVE-2014-1703", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1703" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the WebSocketDispatcherHost::SendOrDrop function in content/browser/renderer_host/websocket_dispatcher_host.cc in the Web Sockets implementation in Google Chrome before 33.0.1750.149 might allow remote attackers to bypass the sandbox protection mechanism by leveraging an incorrect deletion in a certain failure case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1703", "url": "https://www.suse.com/security/cve/CVE-2014-1703" }, { "category": "external", "summary": "SUSE Bug 866959 for CVE-2014-1703", "url": "https://bugzilla.suse.com/866959" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1703" }, { "cve": "CVE-2014-1704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1704" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1704", "url": "https://www.suse.com/security/cve/CVE-2014-1704" }, { "category": "external", "summary": "SUSE Bug 866959 for CVE-2014-1704", "url": "https://bugzilla.suse.com/866959" }, { "category": "external", "summary": "SUSE Bug 868707 for CVE-2014-1704", "url": "https://bugzilla.suse.com/868707" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2014-1704" }, { "cve": "CVE-2014-1705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1705" } ], "notes": [ { "category": "general", "text": "Google V8, as used in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1705", "url": "https://www.suse.com/security/cve/CVE-2014-1705" }, { "category": "external", "summary": "SUSE Bug 866959 for CVE-2014-1705", "url": "https://bugzilla.suse.com/866959" }, { "category": "external", "summary": "SUSE Bug 868707 for CVE-2014-1705", "url": "https://bugzilla.suse.com/868707" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2014-1705" }, { "cve": "CVE-2014-1713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1713" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the AttributeSetter function in bindings/templates/attributes.cpp in the bindings in Blink, as used in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the document.location value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1713", "url": "https://www.suse.com/security/cve/CVE-2014-1713" }, { "category": "external", "summary": "SUSE Bug 866959 for CVE-2014-1713", "url": "https://bugzilla.suse.com/866959" }, { "category": "external", "summary": "SUSE Bug 871792 for CVE-2014-1713", "url": "https://bugzilla.suse.com/871792" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1713" }, { "cve": "CVE-2014-1714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1714" } ], "notes": [ { "category": "general", "text": "The ScopedClipboardWriter::WritePickledData function in ui/base/clipboard/scoped_clipboard_writer.cc in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows does not verify a certain format value, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the clipboard.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1714", "url": "https://www.suse.com/security/cve/CVE-2014-1714" }, { "category": "external", "summary": "SUSE Bug 866959 for CVE-2014-1714", "url": "https://bugzilla.suse.com/866959" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1714" }, { "cve": "CVE-2014-1715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1715" } ], "notes": [ { "category": "general", "text": "Directory traversal vulnerability in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows has unspecified impact and attack vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1715", "url": "https://www.suse.com/security/cve/CVE-2014-1715" }, { "category": "external", "summary": "SUSE Bug 866959 for CVE-2014-1715", "url": "https://bugzilla.suse.com/866959" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1715" }, { "cve": "CVE-2014-1716", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1716" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the Runtime_SetPrototype function in runtime.cc in Google V8, as used in Google Chrome before 34.0.1847.116, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka \"Universal XSS (UXSS).\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1716", "url": "https://www.suse.com/security/cve/CVE-2014-1716" }, { "category": "external", "summary": "SUSE Bug 872805 for CVE-2014-1716", "url": "https://bugzilla.suse.com/872805" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1716" }, { "cve": "CVE-2014-1717", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1717" } ], "notes": [ { "category": "general", "text": "Google V8, as used in Google Chrome before 34.0.1847.116, does not properly use numeric casts during handling of typed arrays, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1717", "url": "https://www.suse.com/security/cve/CVE-2014-1717" }, { "category": "external", "summary": "SUSE Bug 872805 for CVE-2014-1717", "url": "https://bugzilla.suse.com/872805" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1717" }, { "cve": "CVE-2014-1718", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1718" } ], "notes": [ { "category": "general", "text": "Integer overflow in the SoftwareFrameManager::SwapToNewFrame function in content/browser/renderer_host/software_frame_manager.cc in the software compositor in Google Chrome before 34.0.1847.116 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted mapping of a large amount of renderer memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1718", "url": "https://www.suse.com/security/cve/CVE-2014-1718" }, { "category": "external", "summary": "SUSE Bug 872805 for CVE-2014-1718", "url": "https://bugzilla.suse.com/872805" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1718" }, { "cve": "CVE-2014-1719", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1719" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the WebSharedWorkerStub::OnTerminateWorkerContext function in content/worker/websharedworker_stub.cc in the Web Workers implementation in Google Chrome before 34.0.1847.116 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger a SharedWorker termination during script loading.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1719", "url": "https://www.suse.com/security/cve/CVE-2014-1719" }, { "category": "external", "summary": "SUSE Bug 872805 for CVE-2014-1719", "url": "https://bugzilla.suse.com/872805" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1719" }, { "cve": "CVE-2014-1720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1720" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the HTMLBodyElement::insertedInto function in core/html/HTMLBodyElement.cpp in Blink, as used in Google Chrome before 34.0.1847.116, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1720", "url": "https://www.suse.com/security/cve/CVE-2014-1720" }, { "category": "external", "summary": "SUSE Bug 872805 for CVE-2014-1720", "url": "https://bugzilla.suse.com/872805" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1720" }, { "cve": "CVE-2014-1721", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1721" } ], "notes": [ { "category": "general", "text": "Google V8, as used in Google Chrome before 34.0.1847.116, does not properly implement lazy deoptimization, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by improper handling of a heap allocation of a number outside the Small Integer (aka smi) range.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1721", "url": "https://www.suse.com/security/cve/CVE-2014-1721" }, { "category": "external", "summary": "SUSE Bug 872805 for CVE-2014-1721", "url": "https://bugzilla.suse.com/872805" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1721" }, { "cve": "CVE-2014-1722", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1722" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the RenderBlock::addChildIgnoringAnonymousColumnBlocks function in core/rendering/RenderBlock.cpp in Blink, as used in Google Chrome before 34.0.1847.116, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving addition of a child node.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1722", "url": "https://www.suse.com/security/cve/CVE-2014-1722" }, { "category": "external", "summary": "SUSE Bug 872805 for CVE-2014-1722", "url": "https://bugzilla.suse.com/872805" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1722" }, { "cve": "CVE-2014-1723", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1723" } ], "notes": [ { "category": "general", "text": "The UnescapeURLWithOffsetsImpl function in net/base/escape.cc in Google Chrome before 34.0.1847.116 does not properly handle bidirectional Internationalized Resource Identifiers (IRIs), which makes it easier for remote attackers to spoof URLs via crafted use of right-to-left (RTL) Unicode text.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1723", "url": "https://www.suse.com/security/cve/CVE-2014-1723" }, { "category": "external", "summary": "SUSE Bug 872805 for CVE-2014-1723", "url": "https://bugzilla.suse.com/872805" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1723" }, { "cve": "CVE-2014-1724", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1724" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Free(b)soft Laboratory Speech Dispatcher 0.7.1, as used in Google Chrome before 34.0.1847.116, allows remote attackers to cause a denial of service (application hang) or possibly have unspecified other impact via a text-to-speech request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1724", "url": "https://www.suse.com/security/cve/CVE-2014-1724" }, { "category": "external", "summary": "SUSE Bug 872805 for CVE-2014-1724", "url": "https://bugzilla.suse.com/872805" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1724" }, { "cve": "CVE-2014-1725", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1725" } ], "notes": [ { "category": "general", "text": "The base64DecodeInternal function in wtf/text/Base64.cpp in Blink, as used in Google Chrome before 34.0.1847.116, does not properly handle string data composed exclusively of whitespace characters, which allows remote attackers to cause a denial of service (out-of-bounds read) via a window.atob method call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1725", "url": "https://www.suse.com/security/cve/CVE-2014-1725" }, { "category": "external", "summary": "SUSE Bug 872805 for CVE-2014-1725", "url": "https://bugzilla.suse.com/872805" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-1725" }, { "cve": "CVE-2014-1726", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1726" } ], "notes": [ { "category": "general", "text": "The drag implementation in Google Chrome before 34.0.1847.116 allows user-assisted remote attackers to bypass the Same Origin Policy and forge local pathnames by leveraging renderer access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1726", "url": "https://www.suse.com/security/cve/CVE-2014-1726" }, { "category": "external", "summary": "SUSE Bug 872805 for CVE-2014-1726", "url": "https://bugzilla.suse.com/872805" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-1726" }, { "cve": "CVE-2014-1727", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1727" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in content/renderer/renderer_webcolorchooser_impl.h in Google Chrome before 34.0.1847.116 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to forms.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1727", "url": "https://www.suse.com/security/cve/CVE-2014-1727" }, { "category": "external", "summary": "SUSE Bug 872805 for CVE-2014-1727", "url": "https://bugzilla.suse.com/872805" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1727" }, { "cve": "CVE-2014-1728", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1728" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 34.0.1847.116 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1728", "url": "https://www.suse.com/security/cve/CVE-2014-1728" }, { "category": "external", "summary": "SUSE Bug 872805 for CVE-2014-1728", "url": "https://bugzilla.suse.com/872805" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1728" }, { "cve": "CVE-2014-1729", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1729" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google V8 before 3.24.35.22, as used in Google Chrome before 34.0.1847.116, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1729", "url": "https://www.suse.com/security/cve/CVE-2014-1729" }, { "category": "external", "summary": "SUSE Bug 872805 for CVE-2014-1729", "url": "https://bugzilla.suse.com/872805" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1729" }, { "cve": "CVE-2014-1730", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1730" } ], "notes": [ { "category": "general", "text": "Google V8, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly store internationalization metadata, which allows remote attackers to bypass intended access restrictions by leveraging \"type confusion\" and reading property values, related to i18n.js and runtime.cc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1730", "url": "https://www.suse.com/security/cve/CVE-2014-1730" }, { "category": "external", "summary": "SUSE Bug 875408 for CVE-2014-1730", "url": "https://bugzilla.suse.com/875408" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1730" }, { "cve": "CVE-2014-1731", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1731" } ], "notes": [ { "category": "general", "text": "core/html/HTMLSelectElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly check renderer state upon a focus event, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage \"type confusion\" for SELECT elements.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1731", "url": "https://www.suse.com/security/cve/CVE-2014-1731" }, { "category": "external", "summary": "SUSE Bug 875408 for CVE-2014-1731", "url": "https://bugzilla.suse.com/875408" }, { "category": "external", "summary": "SUSE Bug 879607 for CVE-2014-1731", "url": "https://bugzilla.suse.com/879607" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1731" }, { "cve": "CVE-2014-1732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1732" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in browser/ui/views/speech_recognition_bubble_views.cc in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact via an INPUT element that triggers the presence of a Speech Recognition Bubble window for an incorrect duration.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1732", "url": "https://www.suse.com/security/cve/CVE-2014-1732" }, { "category": "external", "summary": "SUSE Bug 875408 for CVE-2014-1732", "url": "https://bugzilla.suse.com/875408" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1732" }, { "cve": "CVE-2014-1733", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1733" } ], "notes": [ { "category": "general", "text": "The PointerCompare function in codegen.cc in Seccomp-BPF, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly merge blocks, which might allow remote attackers to bypass intended sandbox restrictions by leveraging renderer access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1733", "url": "https://www.suse.com/security/cve/CVE-2014-1733" }, { "category": "external", "summary": "SUSE Bug 875408 for CVE-2014-1733", "url": "https://bugzilla.suse.com/875408" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1733" }, { "cve": "CVE-2014-1734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1734" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1734", "url": "https://www.suse.com/security/cve/CVE-2014-1734" }, { "category": "external", "summary": "SUSE Bug 875408 for CVE-2014-1734", "url": "https://bugzilla.suse.com/875408" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1734" }, { "cve": "CVE-2014-1735", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1735" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google V8 before 3.24.35.33, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1735", "url": "https://www.suse.com/security/cve/CVE-2014-1735" }, { "category": "external", "summary": "SUSE Bug 875408 for CVE-2014-1735", "url": "https://bugzilla.suse.com/875408" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1735" }, { "cve": "CVE-2014-1740", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1740" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in net/websockets/websocket_job.cc in the WebSockets implementation in Google Chrome before 34.0.1847.137 allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to WebSocketJob deletion.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1740", "url": "https://www.suse.com/security/cve/CVE-2014-1740" }, { "category": "external", "summary": "SUSE Bug 877768 for CVE-2014-1740", "url": "https://bugzilla.suse.com/877768" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1740" }, { "cve": "CVE-2014-1741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1741" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the replace-data functionality in the CharacterData interface implementation in core/dom/CharacterData.cpp in Blink, as used in Google Chrome before 34.0.1847.137, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to ranges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1741", "url": "https://www.suse.com/security/cve/CVE-2014-1741" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1741" }, { "cve": "CVE-2014-1742", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1742" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the FrameSelection::updateAppearance function in core/editing/FrameSelection.cpp in Blink, as used in Google Chrome before 34.0.1847.137, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper RenderObject handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1742", "url": "https://www.suse.com/security/cve/CVE-2014-1742" }, { "category": "external", "summary": "SUSE Bug 877768 for CVE-2014-1742", "url": "https://bugzilla.suse.com/877768" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1742" }, { "cve": "CVE-2014-1743", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1743" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the StyleElement::removedFromDocument function in core/dom/StyleElement.cpp in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code that triggers tree mutation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1743", "url": "https://www.suse.com/security/cve/CVE-2014-1743" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1743" }, { "cve": "CVE-2014-1744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1744" } ], "notes": [ { "category": "general", "text": "Integer overflow in the AudioInputRendererHost::OnCreateStream function in content/browser/renderer_host/media/audio_input_renderer_host.cc in Google Chrome before 35.0.1916.114 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large shared-memory allocation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1744", "url": "https://www.suse.com/security/cve/CVE-2014-1744" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1744" }, { "cve": "CVE-2014-1745", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1745" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger removal of an SVGFontFaceElement object, related to core/svg/SVGFontFaceElement.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1745", "url": "https://www.suse.com/security/cve/CVE-2014-1745" }, { "category": "external", "summary": "SUSE Bug 1219604 for CVE-2014-1745", "url": "https://bugzilla.suse.com/1219604" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1745" }, { "cve": "CVE-2014-1746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1746" } ], "notes": [ { "category": "general", "text": "The InMemoryUrlProtocol::Read function in media/filters/in_memory_url_protocol.cc in Google Chrome before 35.0.1916.114 relies on an insufficiently large integer data type, which allows remote attackers to cause a denial of service (out-of-bounds read) via vectors that trigger use of a large buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1746", "url": "https://www.suse.com/security/cve/CVE-2014-1746" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-1746" }, { "cve": "CVE-2014-1747", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1747" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the DocumentLoader::maybeCreateArchive function in core/loader/DocumentLoader.cpp in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to inject arbitrary web script or HTML via crafted MHTML content, aka \"Universal XSS (UXSS).\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1747", "url": "https://www.suse.com/security/cve/CVE-2014-1747" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-1747" }, { "cve": "CVE-2014-1748", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1748" } ], "notes": [ { "category": "general", "text": "The ScrollView::paint function in platform/scroll/ScrollView.cpp in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to spoof the UI by extending scrollbar painting into the parent frame.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1748", "url": "https://www.suse.com/security/cve/CVE-2014-1748" }, { "category": "external", "summary": "SUSE Bug 909707 for CVE-2014-1748", "url": "https://bugzilla.suse.com/909707" }, { "category": "external", "summary": "SUSE Bug 971460 for CVE-2014-1748", "url": "https://bugzilla.suse.com/971460" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-1748" }, { "cve": "CVE-2014-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1749" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 35.0.1916.114 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1749", "url": "https://www.suse.com/security/cve/CVE-2014-1749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-1749" }, { "cve": "CVE-2014-3152", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3152" } ], "notes": [ { "category": "general", "text": "Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3152", "url": "https://www.suse.com/security/cve/CVE-2014-3152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3152" }, { "cve": "CVE-2014-3154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3154" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the ChildThread::Shutdown function in content/child/child_thread.cc in the filesystem API in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to a Blink shutdown.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3154", "url": "https://www.suse.com/security/cve/CVE-2014-3154" }, { "category": "external", "summary": "SUSE Bug 882267 for CVE-2014-3154", "url": "https://bugzilla.suse.com/882267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3154" }, { "cve": "CVE-2014-3155", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3155" } ], "notes": [ { "category": "general", "text": "net/spdy/spdy_write_queue.cc in the SPDY implementation in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service (out-of-bounds read) by leveraging incorrect queue maintenance.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3155", "url": "https://www.suse.com/security/cve/CVE-2014-3155" }, { "category": "external", "summary": "SUSE Bug 882263 for CVE-2014-3155", "url": "https://bugzilla.suse.com/882263" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3155" }, { "cve": "CVE-2014-3156", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3156" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the clipboard implementation in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger unexpected bitmap data, related to content/renderer/renderer_clipboard_client.cc and content/renderer/webclipboard_impl.cc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3156", "url": "https://www.suse.com/security/cve/CVE-2014-3156" }, { "category": "external", "summary": "SUSE Bug 882264 for CVE-2014-3156", "url": "https://bugzilla.suse.com/882264" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3156" }, { "cve": "CVE-2014-3157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3157" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3157", "url": "https://www.suse.com/security/cve/CVE-2014-3157" }, { "category": "external", "summary": "SUSE Bug 882265 for CVE-2014-3157", "url": "https://bugzilla.suse.com/882265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3157" }, { "cve": "CVE-2014-3160", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3160" } ], "notes": [ { "category": "general", "text": "The ResourceFetcher::canRequest function in core/fetch/ResourceFetcher.cpp in Blink, as used in Google Chrome before 36.0.1985.125, does not properly restrict subresource requests associated with SVG files, which allows remote attackers to bypass the Same Origin Policy via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3160", "url": "https://www.suse.com/security/cve/CVE-2014-3160" }, { "category": "external", "summary": "SUSE Bug 887952 for CVE-2014-3160", "url": "https://bugzilla.suse.com/887952" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3160" }, { "cve": "CVE-2014-3162", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3162" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 36.0.1985.125 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3162", "url": "https://www.suse.com/security/cve/CVE-2014-3162" }, { "category": "external", "summary": "SUSE Bug 887955 for CVE-2014-3162", "url": "https://bugzilla.suse.com/887955" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3162" }, { "cve": "CVE-2014-3165", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3165" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in modules/websockets/WorkerThreadableWebSocketChannel.cpp in the Web Sockets implementation in Blink, as used in Google Chrome before 36.0.1985.143, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an unexpectedly long lifetime of a temporary object during method completion.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3165", "url": "https://www.suse.com/security/cve/CVE-2014-3165" }, { "category": "external", "summary": "SUSE Bug 891717 for CVE-2014-3165", "url": "https://bugzilla.suse.com/891717" }, { "category": "external", "summary": "SUSE Bug 891772 for CVE-2014-3165", "url": "https://bugzilla.suse.com/891772" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3165" }, { "cve": "CVE-2014-3166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3166" } ], "notes": [ { "category": "general", "text": "The Public Key Pinning (PKP) implementation in Google Chrome before 36.0.1985.143 on Windows, OS X, and Linux, and before 36.0.1985.135 on Android, does not correctly consider the properties of SPDY connections, which allows remote attackers to obtain sensitive information by leveraging the use of multiple domain names.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3166", "url": "https://www.suse.com/security/cve/CVE-2014-3166" }, { "category": "external", "summary": "SUSE Bug 891717 for CVE-2014-3166", "url": "https://bugzilla.suse.com/891717" }, { "category": "external", "summary": "SUSE Bug 891772 for CVE-2014-3166", "url": "https://bugzilla.suse.com/891772" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3166" }, { "cve": "CVE-2014-3167", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3167" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 36.0.1985.143 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3167", "url": "https://www.suse.com/security/cve/CVE-2014-3167" }, { "category": "external", "summary": "SUSE Bug 891717 for CVE-2014-3167", "url": "https://bugzilla.suse.com/891717" }, { "category": "external", "summary": "SUSE Bug 891772 for CVE-2014-3167", "url": "https://bugzilla.suse.com/891772" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3167" }, { "cve": "CVE-2014-3168", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3168" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before 37.0.2062.94, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper caching associated with animation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3168", "url": "https://www.suse.com/security/cve/CVE-2014-3168" }, { "category": "external", "summary": "SUSE Bug 893720 for CVE-2014-3168", "url": "https://bugzilla.suse.com/893720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3168" }, { "cve": "CVE-2014-3169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3169" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in core/dom/ContainerNode.cpp in the DOM implementation in Blink, as used in Google Chrome before 37.0.2062.94, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging script execution that occurs before notification of node removal.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3169", "url": "https://www.suse.com/security/cve/CVE-2014-3169" }, { "category": "external", "summary": "SUSE Bug 893720 for CVE-2014-3169", "url": "https://bugzilla.suse.com/893720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3169" }, { "cve": "CVE-2014-3170", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3170" } ], "notes": [ { "category": "general", "text": "extensions/common/url_pattern.cc in Google Chrome before 37.0.2062.94 does not prevent use of a \u0027\\0\u0027 character in a host name, which allows remote attackers to spoof the extension permission dialog by relying on truncation after this character.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3170", "url": "https://www.suse.com/security/cve/CVE-2014-3170" }, { "category": "external", "summary": "SUSE Bug 893720 for CVE-2014-3170", "url": "https://bugzilla.suse.com/893720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3170" }, { "cve": "CVE-2014-3171", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3171" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the V8 bindings in Blink, as used in Google Chrome before 37.0.2062.94, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper use of HashMap add operations instead of HashMap set operations, related to bindings/core/v8/DOMWrapperMap.h and bindings/core/v8/SerializedScriptValue.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3171", "url": "https://www.suse.com/security/cve/CVE-2014-3171" }, { "category": "external", "summary": "SUSE Bug 893720 for CVE-2014-3171", "url": "https://bugzilla.suse.com/893720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3171" }, { "cve": "CVE-2014-3172", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3172" } ], "notes": [ { "category": "general", "text": "The Debugger extension API in browser/extensions/api/debugger/debugger_api.cc in Google Chrome before 37.0.2062.94 does not validate a tab\u0027s URL before an attach operation, which allows remote attackers to bypass intended access limitations via an extension that uses a restricted URL, as demonstrated by a chrome:// URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3172", "url": "https://www.suse.com/security/cve/CVE-2014-3172" }, { "category": "external", "summary": "SUSE Bug 893720 for CVE-2014-3172", "url": "https://bugzilla.suse.com/893720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3172" }, { "cve": "CVE-2014-3173", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3173" } ], "notes": [ { "category": "general", "text": "The WebGL implementation in Google Chrome before 37.0.2062.94 does not ensure that clear calls interact properly with the state of a draw buffer, which allows remote attackers to cause a denial of service (read of uninitialized memory) via a crafted CANVAS element, related to gpu/command_buffer/service/framebuffer_manager.cc and gpu/command_buffer/service/gles2_cmd_decoder.cc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3173", "url": "https://www.suse.com/security/cve/CVE-2014-3173" }, { "category": "external", "summary": "SUSE Bug 893720 for CVE-2014-3173", "url": "https://bugzilla.suse.com/893720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3173" }, { "cve": "CVE-2014-3174", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3174" } ], "notes": [ { "category": "general", "text": "modules/webaudio/BiquadDSPKernel.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 37.0.2062.94, does not properly consider concurrent threads during attempts to update biquad filter coefficients, which allows remote attackers to cause a denial of service (read of uninitialized memory) via crafted API calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3174", "url": "https://www.suse.com/security/cve/CVE-2014-3174" }, { "category": "external", "summary": "SUSE Bug 893720 for CVE-2014-3174", "url": "https://bugzilla.suse.com/893720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3174" }, { "cve": "CVE-2014-3175", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3175" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 37.0.2062.94 allow attackers to cause a denial of service or possibly have other impact via unknown vectors, related to the load_truetype_glyph function in truetype/ttgload.c in FreeType and other functions in other components.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3175", "url": "https://www.suse.com/security/cve/CVE-2014-3175" }, { "category": "external", "summary": "SUSE Bug 893720 for CVE-2014-3175", "url": "https://bugzilla.suse.com/893720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2014-3175" }, { "cve": "CVE-2014-3176", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3176" } ], "notes": [ { "category": "general", "text": "Google Chrome before 37.0.2062.94 does not properly handle the interaction of extensions, IPC, the sync API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-3177.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3176", "url": "https://www.suse.com/security/cve/CVE-2014-3176" }, { "category": "external", "summary": "SUSE Bug 893720 for CVE-2014-3176", "url": "https://bugzilla.suse.com/893720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2014-3176" }, { "cve": "CVE-2014-3178", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3178" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in core/dom/Node.cpp in Blink, as used in Google Chrome before 37.0.2062.120, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of render-tree inconsistencies.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3178", "url": "https://www.suse.com/security/cve/CVE-2014-3178" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3178" }, { "cve": "CVE-2014-3188", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3188" } ], "notes": [ { "category": "general", "text": "Google Chrome before 38.0.2125.101 and Chrome OS before 38.0.2125.101 do not properly handle the interaction of IPC and Google V8, which allows remote attackers to execute arbitrary code via vectors involving JSON data, related to improper parsing of an escaped index by ParseJsonObject in json-parser.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3188", "url": "https://www.suse.com/security/cve/CVE-2014-3188" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2014-3188" }, { "cve": "CVE-2014-3189", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3189" } ], "notes": [ { "category": "general", "text": "The chrome_pdf::CopyImage function in pdf/draw_utils.cc in the PDFium component in Google Chrome before 38.0.2125.101 does not properly validate image-data dimensions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3189", "url": "https://www.suse.com/security/cve/CVE-2014-3189" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2014-3189" }, { "cve": "CVE-2014-3190", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3190" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the Event::currentTarget function in core/events/Event.cpp in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code that accesses the path property of an Event object.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3190", "url": "https://www.suse.com/security/cve/CVE-2014-3190" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2014-3190" }, { "cve": "CVE-2014-3191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3191" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers a widget-position update that improperly interacts with the render tree, related to the FrameView::updateLayoutAndStyleForPainting function in core/frame/FrameView.cpp and the RenderLayerScrollableArea::setScrollOffset function in core/rendering/RenderLayerScrollableArea.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3191", "url": "https://www.suse.com/security/cve/CVE-2014-3191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2014-3191" }, { "cve": "CVE-2014-3192", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3192" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the ProcessingInstruction::setXSLStyleSheet function in core/dom/ProcessingInstruction.cpp in the DOM implementation in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3192", "url": "https://www.suse.com/security/cve/CVE-2014-3192" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2014-3192" }, { "cve": "CVE-2014-3193", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3193" } ], "notes": [ { "category": "general", "text": "The SessionService::GetLastSession function in browser/sessions/session_service.cc in Google Chrome before 38.0.2125.101 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors that leverage \"type confusion\" for callback processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3193", "url": "https://www.suse.com/security/cve/CVE-2014-3193" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2014-3193" }, { "cve": "CVE-2014-3194", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3194" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the Web Workers implementation in Google Chrome before 38.0.2125.101 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3194", "url": "https://www.suse.com/security/cve/CVE-2014-3194" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2014-3194" }, { "cve": "CVE-2014-3195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3195" } ], "notes": [ { "category": "general", "text": "Google V8, as used in Google Chrome before 38.0.2125.101, does not properly track JavaScript heap-memory allocations as allocations of uninitialized memory and does not properly concatenate arrays of double-precision floating-point numbers, which allows remote attackers to obtain sensitive information via crafted JavaScript code, related to the PagedSpace::AllocateRaw and NewSpace::AllocateRaw functions in heap/spaces-inl.h, the LargeObjectSpace::AllocateRaw function in heap/spaces.cc, and the Runtime_ArrayConcat function in runtime.cc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3195", "url": "https://www.suse.com/security/cve/CVE-2014-3195" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3195" }, { "cve": "CVE-2014-3196", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3196" } ], "notes": [ { "category": "general", "text": "base/memory/shared_memory_win.cc in Google Chrome before 38.0.2125.101 on Windows does not properly implement read-only restrictions on shared memory, which allows attackers to bypass a sandbox protection mechanism via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3196", "url": "https://www.suse.com/security/cve/CVE-2014-3196" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3196" }, { "cve": "CVE-2014-3197", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3197" } ], "notes": [ { "category": "general", "text": "The NavigationScheduler::schedulePageBlock function in core/loader/NavigationScheduler.cpp in Blink, as used in Google Chrome before 38.0.2125.101, does not properly provide substitute data for pages blocked by the XSS auditor, which allows remote attackers to obtain sensitive information via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3197", "url": "https://www.suse.com/security/cve/CVE-2014-3197" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3197" }, { "cve": "CVE-2014-3198", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3198" } ], "notes": [ { "category": "general", "text": "The Instance::HandleInputEvent function in pdf/instance.cc in the PDFium component in Google Chrome before 38.0.2125.101 interprets a certain -1 value as an index instead of a no-visible-page error code, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3198", "url": "https://www.suse.com/security/cve/CVE-2014-3198" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2014-3198" }, { "cve": "CVE-2014-3199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3199" } ], "notes": [ { "category": "general", "text": "The wrap function in bindings/core/v8/custom/V8EventCustom.cpp in the V8 bindings in Blink, as used in Google Chrome before 38.0.2125.101, has an erroneous fallback outcome for wrapper-selection failures, which allows remote attackers to cause a denial of service via vectors that trigger stopping a worker process that had been handling an Event object.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3199", "url": "https://www.suse.com/security/cve/CVE-2014-3199" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2014-3199" }, { "cve": "CVE-2014-3200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3200" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 38.0.2125.101 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3200", "url": "https://www.suse.com/security/cve/CVE-2014-3200" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2014-3200" }, { "cve": "CVE-2014-7899", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7899" } ], "notes": [ { "category": "general", "text": "Google Chrome before 38.0.2125.101 allows remote attackers to spoof the address bar by placing a blob: substring at the beginning of the URL, followed by the original URI scheme and a long username string.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7899", "url": "https://www.suse.com/security/cve/CVE-2014-7899" }, { "category": "external", "summary": "SUSE Bug 906320 for CVE-2014-7899", "url": "https://bugzilla.suse.com/906320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-7899" }, { "cve": "CVE-2014-7900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7900" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the CPDF_Parser::IsLinearizedFile function in fpdfapi/fpdf_parser/fpdf_parser_parser.cpp in PDFium, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7900", "url": "https://www.suse.com/security/cve/CVE-2014-7900" }, { "category": "external", "summary": "SUSE Bug 906317 for CVE-2014-7900", "url": "https://bugzilla.suse.com/906317" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7900" }, { "cve": "CVE-2014-7901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7901" } ], "notes": [ { "category": "general", "text": "Integer overflow in the opj_t2_read_packet_data function in fxcodec/fx_libopenjpeg/libopenjpeg20/t2.c in OpenJPEG in PDFium, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a long segment in a JPEG image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7901", "url": "https://www.suse.com/security/cve/CVE-2014-7901" }, { "category": "external", "summary": "SUSE Bug 906322 for CVE-2014-7901", "url": "https://bugzilla.suse.com/906322" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7901" }, { "cve": "CVE-2014-7902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7902" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in PDFium, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7902", "url": "https://www.suse.com/security/cve/CVE-2014-7902" }, { "category": "external", "summary": "SUSE Bug 906328 for CVE-2014-7902", "url": "https://bugzilla.suse.com/906328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7902" }, { "cve": "CVE-2014-7903", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7903" } ], "notes": [ { "category": "general", "text": "Buffer overflow in OpenJPEG before r2911 in PDFium, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JPEG image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7903", "url": "https://www.suse.com/security/cve/CVE-2014-7903" }, { "category": "external", "summary": "SUSE Bug 906318 for CVE-2014-7903", "url": "https://bugzilla.suse.com/906318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7903" }, { "cve": "CVE-2014-7904", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7904" } ], "notes": [ { "category": "general", "text": "Buffer overflow in Skia, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7904", "url": "https://www.suse.com/security/cve/CVE-2014-7904" }, { "category": "external", "summary": "SUSE Bug 906321 for CVE-2014-7904", "url": "https://bugzilla.suse.com/906321" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7904" }, { "cve": "CVE-2014-7905", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7905" } ], "notes": [ { "category": "general", "text": "Google Chrome before 39.0.2171.65 on Android does not prevent navigation to a URL in cases where an intent for the URL lacks CATEGORY_BROWSABLE, which allows remote attackers to bypass intended access restrictions via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7905", "url": "https://www.suse.com/security/cve/CVE-2014-7905" }, { "category": "external", "summary": "SUSE Bug 906330 for CVE-2014-7905", "url": "https://bugzilla.suse.com/906330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-7905" }, { "cve": "CVE-2014-7906", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7906" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the Pepper plugins in Google Chrome before 39.0.2171.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted Flash content that triggers an attempted PepperMediaDeviceManager access outside of the object\u0027s lifetime.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7906", "url": "https://www.suse.com/security/cve/CVE-2014-7906" }, { "category": "external", "summary": "SUSE Bug 906319 for CVE-2014-7906", "url": "https://bugzilla.suse.com/906319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7906" }, { "cve": "CVE-2014-7907", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7907" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in modules/screen_orientation/ScreenOrientationController.cpp in Blink, as used in Google Chrome before 39.0.2171.65, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger improper handling of a detached frame, related to the (1) lock and (2) unlock methods.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7907", "url": "https://www.suse.com/security/cve/CVE-2014-7907" }, { "category": "external", "summary": "SUSE Bug 906323 for CVE-2014-7907", "url": "https://bugzilla.suse.com/906323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7907" }, { "cve": "CVE-2014-7908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7908" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the CheckMov function in media/base/container_names.cc in Google Chrome before 39.0.2171.65 allow remote attackers to cause a denial of service or possibly have unspecified other impact via a large atom in (1) MPEG-4 or (2) QuickTime .mov data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7908", "url": "https://www.suse.com/security/cve/CVE-2014-7908" }, { "category": "external", "summary": "SUSE Bug 906324 for CVE-2014-7908", "url": "https://bugzilla.suse.com/906324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7908" }, { "cve": "CVE-2014-7909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7909" } ], "notes": [ { "category": "general", "text": "effects/SkDashPathEffect.cpp in Skia, as used in Google Chrome before 39.0.2171.65, computes a hash key using uninitialized integer values, which might allow remote attackers to cause a denial of service by rendering crafted data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7909", "url": "https://www.suse.com/security/cve/CVE-2014-7909" }, { "category": "external", "summary": "SUSE Bug 906326 for CVE-2014-7909", "url": "https://bugzilla.suse.com/906326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-7909" }, { "cve": "CVE-2014-7910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7910" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 39.0.2171.65 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7910", "url": "https://www.suse.com/security/cve/CVE-2014-7910" }, { "category": "external", "summary": "SUSE Bug 906327 for CVE-2014-7910", "url": "https://bugzilla.suse.com/906327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7910" }, { "cve": "CVE-2014-7923", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7923" } ], "notes": [ { "category": "general", "text": "The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a look-behind expression.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7923", "url": "https://www.suse.com/security/cve/CVE-2014-7923" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7923", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7923" }, { "cve": "CVE-2014-7924", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7924" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the IndexedDB implementation in Google Chrome before 40.0.2214.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering duplicate BLOB references, related to content/browser/indexed_db/indexed_db_callbacks.cc and content/browser/indexed_db/indexed_db_dispatcher_host.cc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7924", "url": "https://www.suse.com/security/cve/CVE-2014-7924" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7924", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7924" }, { "cve": "CVE-2014-7925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7925" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the WebAudio implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an audio-rendering thread in which AudioNode data is improperly maintained.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7925", "url": "https://www.suse.com/security/cve/CVE-2014-7925" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7925", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7925" }, { "cve": "CVE-2014-7926", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7926" } ], "notes": [ { "category": "general", "text": "The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a zero-length quantifier.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7926", "url": "https://www.suse.com/security/cve/CVE-2014-7926" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7926", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7926" }, { "cve": "CVE-2014-7927", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7927" } ], "notes": [ { "category": "general", "text": "The SimplifiedLowering::DoLoadBuffer function in compiler/simplified-lowering.cc in Google V8, as used in Google Chrome before 40.0.2214.91, does not properly choose an integer data type, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7927", "url": "https://www.suse.com/security/cve/CVE-2014-7927" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7927", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7927" }, { "cve": "CVE-2014-7928", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7928" } ], "notes": [ { "category": "general", "text": "hydrogen.cc in Google V8, as used Google Chrome before 40.0.2214.91, does not properly handle arrays with holes, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code that triggers an array copy.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7928", "url": "https://www.suse.com/security/cve/CVE-2014-7928" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7928", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7928" }, { "cve": "CVE-2014-7929", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7929" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the HTMLScriptElement::didMoveToNewDocument function in core/html/HTMLScriptElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving movement of a SCRIPT element across documents.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7929", "url": "https://www.suse.com/security/cve/CVE-2014-7929" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7929", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7929" }, { "cve": "CVE-2014-7930", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7930" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in core/events/TreeScopeEventContext.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers improper maintenance of TreeScope data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7930", "url": "https://www.suse.com/security/cve/CVE-2014-7930" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7930", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7930" }, { "cve": "CVE-2014-7932", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7932" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the Element::detach function in core/dom/Element.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving pending updates of detached elements.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7932", "url": "https://www.suse.com/security/cve/CVE-2014-7932" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7932", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7932" }, { "cve": "CVE-2014-7933", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7933" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the matroska_read_seek function in libavformat/matroskadec.c in FFmpeg before 2.5.1, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Matroska file that triggers improper maintenance of tracks data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7933", "url": "https://www.suse.com/security/cve/CVE-2014-7933" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7933", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7933" }, { "cve": "CVE-2014-7934", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7934" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to unexpected absence of document data structures.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7934", "url": "https://www.suse.com/security/cve/CVE-2014-7934" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7934", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7934" }, { "cve": "CVE-2014-7935", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7935" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in browser/speech/tts_message_filter.cc in the Speech implementation in Google Chrome before 40.0.2214.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving utterances from a closed tab.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7935", "url": "https://www.suse.com/security/cve/CVE-2014-7935" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7935", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7935" }, { "cve": "CVE-2014-7936", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7936" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the ZoomBubbleView::Close function in browser/ui/views/location_bar/zoom_bubble_view.cc in the Views implementation in Google Chrome before 40.0.2214.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document that triggers improper maintenance of a zoom bubble.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7936", "url": "https://www.suse.com/security/cve/CVE-2014-7936" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7936", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7936" }, { "cve": "CVE-2014-7937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7937" } ], "notes": [ { "category": "general", "text": "Multiple off-by-one errors in libavcodec/vorbisdec.c in FFmpeg before 2.4.2, as used in Google Chrome before 40.0.2214.91, allow remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted Vorbis I data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7937", "url": "https://www.suse.com/security/cve/CVE-2014-7937" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7937", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7937" }, { "cve": "CVE-2014-7938", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7938" } ], "notes": [ { "category": "general", "text": "The Fonts implementation in Google Chrome before 40.0.2214.91 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7938", "url": "https://www.suse.com/security/cve/CVE-2014-7938" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7938", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7938" }, { "cve": "CVE-2014-7939", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7939" } ], "notes": [ { "category": "general", "text": "Google Chrome before 40.0.2214.91, when the Harmony proxy in Google V8 is enabled, allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code with Proxy.create and console.log calls, related to HTTP responses that lack an \"X-Content-Type-Options: nosniff\" header.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7939", "url": "https://www.suse.com/security/cve/CVE-2014-7939" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7939", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7939" }, { "cve": "CVE-2014-7940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7940" } ], "notes": [ { "category": "general", "text": "The collator implementation in i18n/ucol.cpp in International Components for Unicode (ICU) 52 through SVN revision 293126, as used in Google Chrome before 40.0.2214.91, does not initialize memory for a data structure, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted character sequence.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7940", "url": "https://www.suse.com/security/cve/CVE-2014-7940" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7940", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7940" }, { "cve": "CVE-2014-7941", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7941" } ], "notes": [ { "category": "general", "text": "The SelectionOwner::ProcessTarget function in ui/base/x/selection_owner.cc in the UI implementation in Google Chrome before 40.0.2214.91 uses an incorrect data type for a certain length value, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted X11 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7941", "url": "https://www.suse.com/security/cve/CVE-2014-7941" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7941", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7941" }, { "cve": "CVE-2014-7942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7942" } ], "notes": [ { "category": "general", "text": "The Fonts implementation in Google Chrome before 40.0.2214.91 does not initialize memory for a data structure, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7942", "url": "https://www.suse.com/security/cve/CVE-2014-7942" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7942", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7942" }, { "cve": "CVE-2014-7943", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7943" } ], "notes": [ { "category": "general", "text": "Skia, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7943", "url": "https://www.suse.com/security/cve/CVE-2014-7943" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7943", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7943" }, { "cve": "CVE-2014-7944", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7944" } ], "notes": [ { "category": "general", "text": "The sycc422_to_rgb function in fxcodec/codec/fx_codec_jpx_opj.cpp in PDFium, as used in Google Chrome before 40.0.2214.91, does not properly handle odd values of image width, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7944", "url": "https://www.suse.com/security/cve/CVE-2014-7944" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7944", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7944" }, { "cve": "CVE-2014-7945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7945" } ], "notes": [ { "category": "general", "text": "OpenJPEG before r2908, as used in PDFium in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document, related to j2k.c, jp2.c, and t2.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7945", "url": "https://www.suse.com/security/cve/CVE-2014-7945" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7945", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7945" }, { "cve": "CVE-2014-7946", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7946" } ], "notes": [ { "category": "general", "text": "The RenderTable::simplifiedNormalFlowLayout function in core/rendering/RenderTable.cpp in Blink, as used in Google Chrome before 40.0.2214.91, skips captions during table layout in certain situations, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors related to the Fonts implementation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7946", "url": "https://www.suse.com/security/cve/CVE-2014-7946" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7946", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7946" }, { "cve": "CVE-2014-7947", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7947" } ], "notes": [ { "category": "general", "text": "OpenJPEG before r2944, as used in PDFium in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document, related to j2k.c, jp2.c, pi.c, t1.c, t2.c, and tcd.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7947", "url": "https://www.suse.com/security/cve/CVE-2014-7947" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7947", "url": "https://bugzilla.suse.com/914468" }, { "category": "external", "summary": "SUSE Bug 979911 for CVE-2014-7947", "url": "https://bugzilla.suse.com/979911" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7947" }, { "cve": "CVE-2014-7948", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7948" } ], "notes": [ { "category": "general", "text": "The AppCacheUpdateJob::URLFetcher::OnResponseStarted function in content/browser/appcache/appcache_update_job.cc in Google Chrome before 40.0.2214.91 proceeds with AppCache caching for SSL sessions even if there is an X.509 certificate error, which allows man-in-the-middle attackers to spoof HTML5 application content via a crafted certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7948", "url": "https://www.suse.com/security/cve/CVE-2014-7948" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2014-7948", "url": "https://bugzilla.suse.com/914468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7948" }, { "cve": "CVE-2015-1205", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1205" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.91 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1205", "url": "https://www.suse.com/security/cve/CVE-2015-1205" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2015-1205", "url": "https://bugzilla.suse.com/914468" }, { "category": "external", "summary": "SUSE Bug 915529 for CVE-2015-1205", "url": "https://bugzilla.suse.com/915529" }, { "category": "external", "summary": "SUSE Bug 915530 for CVE-2015-1205", "url": "https://bugzilla.suse.com/915530" }, { "category": "external", "summary": "SUSE Bug 915533 for CVE-2015-1205", "url": "https://bugzilla.suse.com/915533" }, { "category": "external", "summary": "SUSE Bug 915534 for CVE-2015-1205", "url": "https://bugzilla.suse.com/915534" }, { "category": "external", "summary": "SUSE Bug 915535 for CVE-2015-1205", "url": "https://bugzilla.suse.com/915535" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1205" }, { "cve": "CVE-2015-1209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1209" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the VisibleSelection::nonBoundaryShadowTreeRootNode function in core/editing/VisibleSelection.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers improper handling of a shadow-root anchor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1209", "url": "https://www.suse.com/security/cve/CVE-2015-1209" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2015-1209", "url": "https://bugzilla.suse.com/914468" }, { "category": "external", "summary": "SUSE Bug 916841 for CVE-2015-1209", "url": "https://bugzilla.suse.com/916841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1209" }, { "cve": "CVE-2015-1210", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1210" } ], "notes": [ { "category": "general", "text": "The V8ThrowException::createDOMException function in bindings/core/v8/V8ThrowException.cpp in the V8 bindings in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, does not properly consider frame access restrictions during the throwing of an exception, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1210", "url": "https://www.suse.com/security/cve/CVE-2015-1210" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2015-1210", "url": "https://bugzilla.suse.com/914468" }, { "category": "external", "summary": "SUSE Bug 916843 for CVE-2015-1210", "url": "https://bugzilla.suse.com/916843" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1210" }, { "cve": "CVE-2015-1211", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1211" } ], "notes": [ { "category": "general", "text": "The OriginCanAccessServiceWorkers function in content/browser/service_worker/service_worker_dispatcher_host.cc in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android does not properly restrict the URI scheme during a ServiceWorker registration, which allows remote attackers to gain privileges via a filesystem: URI.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1211", "url": "https://www.suse.com/security/cve/CVE-2015-1211" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2015-1211", "url": "https://bugzilla.suse.com/914468" }, { "category": "external", "summary": "SUSE Bug 916838 for CVE-2015-1211", "url": "https://bugzilla.suse.com/916838" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1211" }, { "cve": "CVE-2015-1212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1212" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1212", "url": "https://www.suse.com/security/cve/CVE-2015-1212" }, { "category": "external", "summary": "SUSE Bug 914468 for CVE-2015-1212", "url": "https://bugzilla.suse.com/914468" }, { "category": "external", "summary": "SUSE Bug 916840 for CVE-2015-1212", "url": "https://bugzilla.suse.com/916840" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1212", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1212" }, { "cve": "CVE-2015-1213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1213" } ], "notes": [ { "category": "general", "text": "The SkBitmap::ReadRawPixels function in core/SkBitmap.cpp in the filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1213", "url": "https://www.suse.com/security/cve/CVE-2015-1213" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1213", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1213" }, { "cve": "CVE-2015-1214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1214" } ], "notes": [ { "category": "general", "text": "Integer overflow in the SkAutoSTArray implementation in include/core/SkTemplates.h in the filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a reset action with a large count value, leading to an out-of-bounds write operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1214", "url": "https://www.suse.com/security/cve/CVE-2015-1214" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1214", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1214" }, { "cve": "CVE-2015-1215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1215" } ], "notes": [ { "category": "general", "text": "The filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1215", "url": "https://www.suse.com/security/cve/CVE-2015-1215" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1215", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1215" }, { "cve": "CVE-2015-1216", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1216" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the V8Window::namedPropertyGetterCustom function in bindings/core/v8/custom/V8WindowCustom.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a frame detachment.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1216", "url": "https://www.suse.com/security/cve/CVE-2015-1216" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1216", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1216" }, { "cve": "CVE-2015-1217", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1217" } ], "notes": [ { "category": "general", "text": "The V8LazyEventListener::prepareListenerObject function in bindings/core/v8/V8LazyEventListener.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, does not properly compile listeners, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage \"type confusion.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1217", "url": "https://www.suse.com/security/cve/CVE-2015-1217" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1217", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1217" }, { "cve": "CVE-2015-1218", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1218" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in the DOM implementation in Blink, as used in Google Chrome before 41.0.2272.76, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger movement of a SCRIPT element to different documents, related to (1) the HTMLScriptElement::didMoveToNewDocument function in core/html/HTMLScriptElement.cpp and (2) the SVGScriptElement::didMoveToNewDocument function in core/svg/SVGScriptElement.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1218", "url": "https://www.suse.com/security/cve/CVE-2015-1218" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1218", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1218" }, { "cve": "CVE-2015-1219", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1219" } ], "notes": [ { "category": "general", "text": "Integer overflow in the SkMallocPixelRef::NewAllocate function in core/SkMallocPixelRef.cpp in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted allocation of a large amount of memory during WebGL rendering.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1219", "url": "https://www.suse.com/security/cve/CVE-2015-1219" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1219", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1219" }, { "cve": "CVE-2015-1220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1220" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the GIFImageReader::parseData function in platform/image-decoders/gif/GIFImageReader.cpp in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted frame size in a GIF image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1220", "url": "https://www.suse.com/security/cve/CVE-2015-1220" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1220", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1220" }, { "cve": "CVE-2015-1221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1221" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect ordering of operations in the Web SQL Database thread relative to Blink\u0027s main thread, related to the shutdown function in web/WebKit.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1221", "url": "https://www.suse.com/security/cve/CVE-2015-1221" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1221", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1221" }, { "cve": "CVE-2015-1222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1222" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in the ServiceWorkerScriptCacheMap implementation in content/browser/service_worker/service_worker_script_cache_map.cc in Google Chrome before 41.0.2272.76 allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a ServiceWorkerContextWrapper::DeleteAndStartOver call, related to the NotifyStartedCaching and NotifyFinishedCaching functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1222", "url": "https://www.suse.com/security/cve/CVE-2015-1222" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1222", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1222" }, { "cve": "CVE-2015-1223", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1223" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in core/html/HTMLInputElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 41.0.2272.76, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger extraneous change events, as demonstrated by events for invalid input or input to read-only fields, related to the initializeTypeInParsing and updateType functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1223", "url": "https://www.suse.com/security/cve/CVE-2015-1223" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1223", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1223" }, { "cve": "CVE-2015-1224", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1224" } ], "notes": [ { "category": "general", "text": "The VpxVideoDecoder::VpxDecode function in media/filters/vpx_video_decoder.cc in the vpxdecoder implementation in Google Chrome before 41.0.2272.76 does not ensure that alpha-plane dimensions are identical to image dimensions, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted VPx video data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1224", "url": "https://www.suse.com/security/cve/CVE-2015-1224" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1224", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1224" }, { "cve": "CVE-2015-1225", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1225" } ], "notes": [ { "category": "general", "text": "PDFium, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1225", "url": "https://www.suse.com/security/cve/CVE-2015-1225" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1225", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1225" }, { "cve": "CVE-2015-1226", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1226" } ], "notes": [ { "category": "general", "text": "The DebuggerFunction::InitAgentHost function in browser/extensions/api/debugger/debugger_api.cc in Google Chrome before 41.0.2272.76 does not properly restrict what URLs are available as debugger targets, which allows remote attackers to bypass intended access restrictions via a crafted extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1226", "url": "https://www.suse.com/security/cve/CVE-2015-1226" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1226", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1226" }, { "cve": "CVE-2015-1227", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1227" } ], "notes": [ { "category": "general", "text": "The DragImage::create function in platform/DragImage.cpp in Blink, as used in Google Chrome before 41.0.2272.76, does not initialize memory for image drawing, which allows remote attackers to have an unspecified impact by triggering a failed image decoding, as demonstrated by an image for which the default orientation cannot be used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1227", "url": "https://www.suse.com/security/cve/CVE-2015-1227" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1227", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1227" }, { "cve": "CVE-2015-1228", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1228" } ], "notes": [ { "category": "general", "text": "The RenderCounter::updateCounter function in core/rendering/RenderCounter.cpp in Blink, as used in Google Chrome before 41.0.2272.76, does not force a relayout operation and consequently does not initialize memory for a data structure, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted Cascading Style Sheets (CSS) token sequence.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1228", "url": "https://www.suse.com/security/cve/CVE-2015-1228" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1228", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1228" }, { "cve": "CVE-2015-1229", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1229" } ], "notes": [ { "category": "general", "text": "net/http/proxy_client_socket.cc in Google Chrome before 41.0.2272.76 does not properly handle a 407 (aka Proxy Authentication Required) HTTP status code accompanied by a Set-Cookie header, which allows remote proxy servers to conduct cookie-injection attacks via a crafted response.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1229", "url": "https://www.suse.com/security/cve/CVE-2015-1229" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1229", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1229" }, { "cve": "CVE-2015-1230", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1230" } ], "notes": [ { "category": "general", "text": "The getHiddenProperty function in bindings/core/v8/V8EventListenerList.h in Blink, as used in Google Chrome before 41.0.2272.76, has a name conflict with the AudioContext class, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via JavaScript code that adds an AudioContext event listener and triggers \"type confusion.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1230", "url": "https://www.suse.com/security/cve/CVE-2015-1230" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1230", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1230" }, { "cve": "CVE-2015-1231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1231" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 41.0.2272.76 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1231", "url": "https://www.suse.com/security/cve/CVE-2015-1231" }, { "category": "external", "summary": "SUSE Bug 920825 for CVE-2015-1231", "url": "https://bugzilla.suse.com/920825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1231" }, { "cve": "CVE-2015-1233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1233" } ], "notes": [ { "category": "general", "text": "Google Chrome before 41.0.2272.118 does not properly handle the interaction of IPC, the Gamepad API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1233", "url": "https://www.suse.com/security/cve/CVE-2015-1233" }, { "category": "external", "summary": "SUSE Bug 925713 for CVE-2015-1233", "url": "https://bugzilla.suse.com/925713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1233" }, { "cve": "CVE-2015-1234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1234" } ], "notes": [ { "category": "general", "text": "Race condition in gpu/command_buffer/service/gles2_cmd_decoder.cc in Google Chrome before 41.0.2272.118 allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact by manipulating OpenGL ES commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1234", "url": "https://www.suse.com/security/cve/CVE-2015-1234" }, { "category": "external", "summary": "SUSE Bug 925714 for CVE-2015-1234", "url": "https://bugzilla.suse.com/925714" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1234" }, { "cve": "CVE-2015-1235", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1235" } ], "notes": [ { "category": "general", "text": "The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in the HTML parser in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy via a crafted HTML document with an IFRAME element.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1235", "url": "https://www.suse.com/security/cve/CVE-2015-1235" }, { "category": "external", "summary": "SUSE Bug 927302 for CVE-2015-1235", "url": "https://bugzilla.suse.com/927302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1235" }, { "cve": "CVE-2015-1236", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1236" } ], "notes": [ { "category": "general", "text": "The MediaElementAudioSourceNode::process function in modules/webaudio/MediaElementAudioSourceNode.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy and obtain sensitive audio sample values via a crafted web site containing a media element.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1236", "url": "https://www.suse.com/security/cve/CVE-2015-1236" }, { "category": "external", "summary": "SUSE Bug 927302 for CVE-2015-1236", "url": "https://bugzilla.suse.com/927302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1236" }, { "cve": "CVE-2015-1237", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1237" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the RenderFrameImpl::OnMessageReceived function in content/renderer/render_frame_impl.cc in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger renderer IPC messages during a detach operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1237", "url": "https://www.suse.com/security/cve/CVE-2015-1237" }, { "category": "external", "summary": "SUSE Bug 927302 for CVE-2015-1237", "url": "https://bugzilla.suse.com/927302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1237" }, { "cve": "CVE-2015-1238", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1238" } ], "notes": [ { "category": "general", "text": "Skia, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1238", "url": "https://www.suse.com/security/cve/CVE-2015-1238" }, { "category": "external", "summary": "SUSE Bug 927302 for CVE-2015-1238", "url": "https://bugzilla.suse.com/927302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1238" }, { "cve": "CVE-2015-1240", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1240" } ], "notes": [ { "category": "general", "text": "gpu/blink/webgraphicscontext3d_impl.cc in the WebGL implementation in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WebGL program that triggers a state inconsistency.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1240", "url": "https://www.suse.com/security/cve/CVE-2015-1240" }, { "category": "external", "summary": "SUSE Bug 927302 for CVE-2015-1240", "url": "https://bugzilla.suse.com/927302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1240" }, { "cve": "CVE-2015-1241", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1241" } ], "notes": [ { "category": "general", "text": "Google Chrome before 42.0.2311.90 does not properly consider the interaction of page navigation with the handling of touch events and gesture events, which allows remote attackers to trigger unintended UI actions via a crafted web site that conducts a \"tapjacking\" attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1241", "url": "https://www.suse.com/security/cve/CVE-2015-1241" }, { "category": "external", "summary": "SUSE Bug 927302 for CVE-2015-1241", "url": "https://bugzilla.suse.com/927302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1241" }, { "cve": "CVE-2015-1242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1242" } ], "notes": [ { "category": "general", "text": "The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages \"type confusion\" in the check-elimination optimization.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1242", "url": "https://www.suse.com/security/cve/CVE-2015-1242" }, { "category": "external", "summary": "SUSE Bug 927302 for CVE-2015-1242", "url": "https://bugzilla.suse.com/927302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1242" }, { "cve": "CVE-2015-1243", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1243" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the MutationObserver::disconnect function in core/dom/MutationObserver.cpp in the DOM implementation in Blink, as used in Google Chrome before 42.0.2311.135, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an attempt to unregister a MutationObserver object that is not currently registered.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1243", "url": "https://www.suse.com/security/cve/CVE-2015-1243" }, { "category": "external", "summary": "SUSE Bug 929075 for CVE-2015-1243", "url": "https://bugzilla.suse.com/929075" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1243" }, { "cve": "CVE-2015-1244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1244" } ], "notes": [ { "category": "general", "text": "The URLRequest::GetHSTSRedirect function in url_request/url_request.cc in Google Chrome before 42.0.2311.90 does not replace the ws scheme with the wss scheme whenever an HSTS Policy is active, which makes it easier for remote attackers to obtain sensitive information by sniffing the network for WebSocket traffic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1244", "url": "https://www.suse.com/security/cve/CVE-2015-1244" }, { "category": "external", "summary": "SUSE Bug 927302 for CVE-2015-1244", "url": "https://bugzilla.suse.com/927302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1244" }, { "cve": "CVE-2015-1245", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1245" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the OpenPDFInReaderView::Update function in browser/ui/views/location_bar/open_pdf_in_reader_view.cc in Google Chrome before 41.0.2272.76 might allow user-assisted remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by triggering interaction with a PDFium \"Open PDF in Reader\" button that has an invalid tab association.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1245", "url": "https://www.suse.com/security/cve/CVE-2015-1245" }, { "category": "external", "summary": "SUSE Bug 927302 for CVE-2015-1245", "url": "https://bugzilla.suse.com/927302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1245" }, { "cve": "CVE-2015-1246", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1246" } ], "notes": [ { "category": "general", "text": "Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1246", "url": "https://www.suse.com/security/cve/CVE-2015-1246" }, { "category": "external", "summary": "SUSE Bug 927302 for CVE-2015-1246", "url": "https://bugzilla.suse.com/927302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1246" }, { "cve": "CVE-2015-1247", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1247" } ], "notes": [ { "category": "general", "text": "The SearchEngineTabHelper::OnPageHasOSDD function in browser/ui/search_engines/search_engine_tab_helper.cc in Google Chrome before 42.0.2311.90 does not prevent use of a file: URL for an OpenSearch descriptor XML document, which might allow remote attackers to obtain sensitive information from local files via a crafted (1) http or (2) https web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1247", "url": "https://www.suse.com/security/cve/CVE-2015-1247" }, { "category": "external", "summary": "SUSE Bug 927302 for CVE-2015-1247", "url": "https://bugzilla.suse.com/927302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1247" }, { "cve": "CVE-2015-1248", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1248" } ], "notes": [ { "category": "general", "text": "The FileSystem API in Google Chrome before 40.0.2214.91 allows remote attackers to bypass the SafeBrowsing for Executable Files protection mechanism by creating a .exe file in a temporary filesystem and then referencing this file with a filesystem:http: URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1248", "url": "https://www.suse.com/security/cve/CVE-2015-1248" }, { "category": "external", "summary": "SUSE Bug 927302 for CVE-2015-1248", "url": "https://bugzilla.suse.com/927302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1248" }, { "cve": "CVE-2015-1249", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1249" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.90 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1249", "url": "https://www.suse.com/security/cve/CVE-2015-1249" }, { "category": "external", "summary": "SUSE Bug 927302 for CVE-2015-1249", "url": "https://bugzilla.suse.com/927302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1249" }, { "cve": "CVE-2015-1250", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1250" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.135 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1250", "url": "https://www.suse.com/security/cve/CVE-2015-1250" }, { "category": "external", "summary": "SUSE Bug 929075 for CVE-2015-1250", "url": "https://bugzilla.suse.com/929075" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1250" }, { "cve": "CVE-2015-1251", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1251" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the SpeechRecognitionClient implementation in the Speech subsystem in Google Chrome before 43.0.2357.65 allows remote attackers to execute arbitrary code via a crafted document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1251", "url": "https://www.suse.com/security/cve/CVE-2015-1251" }, { "category": "external", "summary": "SUSE Bug 931659 for CVE-2015-1251", "url": "https://bugzilla.suse.com/931659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1251" }, { "cve": "CVE-2015-1252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1252" } ], "notes": [ { "category": "general", "text": "common/partial_circular_buffer.cc in Google Chrome before 43.0.2357.65 does not properly handle wraps, which allows remote attackers to bypass a sandbox protection mechanism or cause a denial of service (out-of-bounds write) via vectors that trigger a write operation with a large amount of data, related to the PartialCircularBuffer::Write and PartialCircularBuffer::DoWrite functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1252", "url": "https://www.suse.com/security/cve/CVE-2015-1252" }, { "category": "external", "summary": "SUSE Bug 931671 for CVE-2015-1252", "url": "https://bugzilla.suse.com/931671" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1252" }, { "cve": "CVE-2015-1253", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1253" } ], "notes": [ { "category": "general", "text": "core/html/parser/HTMLConstructionSite.cpp in the DOM implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that appends a child to a SCRIPT element, related to the insert and executeReparentTask functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1253", "url": "https://www.suse.com/security/cve/CVE-2015-1253" }, { "category": "external", "summary": "SUSE Bug 931670 for CVE-2015-1253", "url": "https://bugzilla.suse.com/931670" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1253" }, { "cve": "CVE-2015-1254", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1254" } ], "notes": [ { "category": "general", "text": "core/dom/Document.cpp in Blink, as used in Google Chrome before 43.0.2357.65, enables the inheritance of the designMode attribute, which allows remote attackers to bypass the Same Origin Policy by leveraging the availability of editing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1254", "url": "https://www.suse.com/security/cve/CVE-2015-1254" }, { "category": "external", "summary": "SUSE Bug 931669 for CVE-2015-1254", "url": "https://bugzilla.suse.com/931669" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1254" }, { "cve": "CVE-2015-1255", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1255" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in content/renderer/media/webaudio_capturer_source.cc in the WebAudio implementation in Google Chrome before 43.0.2357.65 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by leveraging improper handling of a stop action for an audio track.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1255", "url": "https://www.suse.com/security/cve/CVE-2015-1255" }, { "category": "external", "summary": "SUSE Bug 931674 for CVE-2015-1255", "url": "https://bugzilla.suse.com/931674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1255" }, { "cve": "CVE-2015-1256", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1256" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document that leverages improper handling of a shadow tree for a use element.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1256", "url": "https://www.suse.com/security/cve/CVE-2015-1256" }, { "category": "external", "summary": "SUSE Bug 931664 for CVE-2015-1256", "url": "https://bugzilla.suse.com/931664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1256" }, { "cve": "CVE-2015-1257", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1257" } ], "notes": [ { "category": "general", "text": "platform/graphics/filters/FEColorMatrix.cpp in the SVG implementation in Blink, as used in Google Chrome before 43.0.2357.65, does not properly handle an insufficient number of values in an feColorMatrix filter, which allows remote attackers to cause a denial of service (container overflow) or possibly have unspecified other impact via a crafted document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1257", "url": "https://www.suse.com/security/cve/CVE-2015-1257" }, { "category": "external", "summary": "SUSE Bug 931665 for CVE-2015-1257", "url": "https://bugzilla.suse.com/931665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1257" }, { "cve": "CVE-2015-1258", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1258" } ], "notes": [ { "category": "general", "text": "Google Chrome before 43.0.2357.65 relies on libvpx code that was not built with an appropriate --size-limit value, which allows remote attackers to trigger a negative value for a size field, and consequently cause a denial of service or possibly have unspecified other impact, via a crafted frame size in VP9 video data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1258", "url": "https://www.suse.com/security/cve/CVE-2015-1258" }, { "category": "external", "summary": "SUSE Bug 931666 for CVE-2015-1258", "url": "https://bugzilla.suse.com/931666" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1258" }, { "cve": "CVE-2015-1259", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1259" } ], "notes": [ { "category": "general", "text": "PDFium, as used in Google Chrome before 43.0.2357.65, does not properly initialize memory, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1259", "url": "https://www.suse.com/security/cve/CVE-2015-1259" }, { "category": "external", "summary": "SUSE Bug 931667 for CVE-2015-1259", "url": "https://bugzilla.suse.com/931667" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1259" }, { "cve": "CVE-2015-1260", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1260" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in content/renderer/media/user_media_client_impl.cc in the WebRTC implementation in Google Chrome before 43.0.2357.65 allow remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that executes upon completion of a getUserMedia request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1260", "url": "https://www.suse.com/security/cve/CVE-2015-1260" }, { "category": "external", "summary": "SUSE Bug 931668 for CVE-2015-1260", "url": "https://bugzilla.suse.com/931668" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1260" }, { "cve": "CVE-2015-1261", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1261" } ], "notes": [ { "category": "general", "text": "android/java/src/org/chromium/chrome/browser/WebsiteSettingsPopup.java in Google Chrome before 43.0.2357.65 on Android does not properly restrict use of a URL\u0027s fragment identifier during construction of a page-info popup, which allows remote attackers to spoof the URL bar or deliver misleading popup content via crafted text.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1261", "url": "https://www.suse.com/security/cve/CVE-2015-1261" }, { "category": "external", "summary": "SUSE Bug 931673 for CVE-2015-1261", "url": "https://bugzilla.suse.com/931673" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1261" }, { "cve": "CVE-2015-1262", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1262" } ], "notes": [ { "category": "general", "text": "platform/fonts/shaping/HarfBuzzShaper.cpp in Blink, as used in Google Chrome before 43.0.2357.65, does not initialize a certain width field, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted Unicode text.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1262", "url": "https://www.suse.com/security/cve/CVE-2015-1262" }, { "category": "external", "summary": "SUSE Bug 931672 for CVE-2015-1262", "url": "https://bugzilla.suse.com/931672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1262" }, { "cve": "CVE-2015-1263", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1263" } ], "notes": [ { "category": "general", "text": "The Spellcheck API implementation in Google Chrome before 43.0.2357.65 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1263", "url": "https://www.suse.com/security/cve/CVE-2015-1263" }, { "category": "external", "summary": "SUSE Bug 931663 for CVE-2015-1263", "url": "https://bugzilla.suse.com/931663" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1263" }, { "cve": "CVE-2015-1264", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1264" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in Google Chrome before 43.0.2357.65 allows user-assisted remote attackers to inject arbitrary web script or HTML via crafted data that is improperly handled by the Bookmarks feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1264", "url": "https://www.suse.com/security/cve/CVE-2015-1264" }, { "category": "external", "summary": "SUSE Bug 931661 for CVE-2015-1264", "url": "https://bugzilla.suse.com/931661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1264" }, { "cve": "CVE-2015-1265", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1265" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 43.0.2357.65 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1265", "url": "https://www.suse.com/security/cve/CVE-2015-1265" }, { "category": "external", "summary": "SUSE Bug 931660 for CVE-2015-1265", "url": "https://bugzilla.suse.com/931660" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1265" }, { "cve": "CVE-2015-1266", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1266" } ], "notes": [ { "category": "general", "text": "content/browser/webui/content_web_ui_controller_factory.cc in Google Chrome before 43.0.2357.130 does not properly consider the scheme in determining whether a URL is associated with a WebUI SiteInstance, which allows remote attackers to bypass intended access restrictions via a similar URL, as demonstrated by use of http://gpu when there is a WebUI class for handling chrome://gpu requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1266", "url": "https://www.suse.com/security/cve/CVE-2015-1266" }, { "category": "external", "summary": "SUSE Bug 935723 for CVE-2015-1266", "url": "https://bugzilla.suse.com/935723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1266" }, { "cve": "CVE-2015-1267", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1267" } ], "notes": [ { "category": "general", "text": "Blink, as used in Google Chrome before 43.0.2357.130, does not properly restrict the creation context during creation of a DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that uses a Blink public API, related to WebArrayBufferConverter.cpp, WebBlob.cpp, WebDOMError.cpp, and WebDOMFileSystem.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1267", "url": "https://www.suse.com/security/cve/CVE-2015-1267" }, { "category": "external", "summary": "SUSE Bug 935723 for CVE-2015-1267", "url": "https://bugzilla.suse.com/935723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1267" }, { "cve": "CVE-2015-1268", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1268" } ], "notes": [ { "category": "general", "text": "bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value\u0027s DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code, as demonstrated by use of a data: URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1268", "url": "https://www.suse.com/security/cve/CVE-2015-1268" }, { "category": "external", "summary": "SUSE Bug 935723 for CVE-2015-1268", "url": "https://bugzilla.suse.com/935723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1268" }, { "cve": "CVE-2015-1269", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1269" } ], "notes": [ { "category": "general", "text": "The DecodeHSTSPreloadRaw function in net/http/transport_security_state.cc in Google Chrome before 43.0.2357.130 does not properly canonicalize DNS hostnames before making comparisons to HSTS or HPKP preload entries, which allows remote attackers to bypass intended access restrictions via a string that (1) ends in a . (dot) character or (2) is not entirely lowercase.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1269", "url": "https://www.suse.com/security/cve/CVE-2015-1269" }, { "category": "external", "summary": "SUSE Bug 935723 for CVE-2015-1269", "url": "https://bugzilla.suse.com/935723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1269" }, { "cve": "CVE-2015-1270", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1270" } ], "notes": [ { "category": "general", "text": "The ucnv_io_getConverterName function in common/ucnv_io.cpp in International Components for Unicode (ICU), as used in Google Chrome before 44.0.2403.89, mishandles converter names with initial x- substrings, which allows remote attackers to cause a denial of service (read of uninitialized memory) or possibly have unspecified other impact via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1270", "url": "https://www.suse.com/security/cve/CVE-2015-1270" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1270", "url": "https://bugzilla.suse.com/939077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1270" }, { "cve": "CVE-2015-1271", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1271" } ], "notes": [ { "category": "general", "text": "PDFium, as used in Google Chrome before 44.0.2403.89, does not properly handle certain out-of-memory conditions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted PDF document that triggers a large memory allocation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1271", "url": "https://www.suse.com/security/cve/CVE-2015-1271" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1271", "url": "https://bugzilla.suse.com/939077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1271" }, { "cve": "CVE-2015-1272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1272" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the GPU process implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging the continued availability of a GPUChannelHost data structure during Blink shutdown, related to content/browser/gpu/browser_gpu_channel_host_factory.cc and content/renderer/render_thread_impl.cc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1272", "url": "https://www.suse.com/security/cve/CVE-2015-1272" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1272", "url": "https://bugzilla.suse.com/939077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1272" }, { "cve": "CVE-2015-1273", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1273" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in j2k.c in OpenJPEG before r3002, as used in PDFium in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid JPEG2000 data in a PDF document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1273", "url": "https://www.suse.com/security/cve/CVE-2015-1273" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1273", "url": "https://bugzilla.suse.com/939077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1273" }, { "cve": "CVE-2015-1274", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1274" } ], "notes": [ { "category": "general", "text": "Google Chrome before 44.0.2403.89 does not ensure that the auto-open list omits all dangerous file types, which makes it easier for remote attackers to execute arbitrary code by providing a crafted file and leveraging a user\u0027s previous \"Always open files of this type\" choice, related to download_commands.cc and download_prefs.cc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1274", "url": "https://www.suse.com/security/cve/CVE-2015-1274" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1274", "url": "https://bugzilla.suse.com/939077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1274" }, { "cve": "CVE-2015-1275", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1275" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in org/chromium/chrome/browser/UrlUtilities.java in Google Chrome before 44.0.2403.89 on Android allows remote attackers to inject arbitrary web script or HTML via a crafted intent: URL, as demonstrated by a trailing alert(document.cookie);// substring, aka \"Universal XSS (UXSS).\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1275", "url": "https://www.suse.com/security/cve/CVE-2015-1275" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1275", "url": "https://bugzilla.suse.com/939077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1275" }, { "cve": "CVE-2015-1276", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1276" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in content/browser/indexed_db/indexed_db_backing_store.cc in the IndexedDB implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging an abort action before a certain write operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1276", "url": "https://www.suse.com/security/cve/CVE-2015-1276" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1276", "url": "https://bugzilla.suse.com/939077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1276" }, { "cve": "CVE-2015-1277", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1277" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the accessibility implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging lack of certain validity checks for accessibility-tree data structures.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1277", "url": "https://www.suse.com/security/cve/CVE-2015-1277" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1277", "url": "https://bugzilla.suse.com/939077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1277" }, { "cve": "CVE-2015-1278", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1278" } ], "notes": [ { "category": "general", "text": "content/browser/web_contents/web_contents_impl.cc in Google Chrome before 44.0.2403.89 does not ensure that a PDF document\u0027s modal dialog is closed upon navigation to an interstitial page, which allows remote attackers to spoof URLs via a crafted document, as demonstrated by the alert_dialog.pdf document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1278", "url": "https://www.suse.com/security/cve/CVE-2015-1278" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1278", "url": "https://bugzilla.suse.com/939077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1278" }, { "cve": "CVE-2015-1279", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1279" } ], "notes": [ { "category": "general", "text": "Integer overflow in the CJBig2_Image::expand function in fxcodec/jbig2/JBig2_Image.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via large height and stride values.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1279", "url": "https://www.suse.com/security/cve/CVE-2015-1279" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1279", "url": "https://bugzilla.suse.com/939077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1279" }, { "cve": "CVE-2015-1280", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1280" } ], "notes": [ { "category": "general", "text": "SkPictureShader.cpp in Skia, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging access to a renderer process and providing crafted serialized data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1280", "url": "https://www.suse.com/security/cve/CVE-2015-1280" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1280", "url": "https://bugzilla.suse.com/939077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1280" }, { "cve": "CVE-2015-1281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1281" } ], "notes": [ { "category": "general", "text": "core/loader/ImageLoader.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly determine the V8 context of a microtask, which allows remote attackers to bypass Content Security Policy (CSP) restrictions by providing an image from an unintended source.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1281", "url": "https://www.suse.com/security/cve/CVE-2015-1281" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1281", "url": "https://bugzilla.suse.com/939077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1281" }, { "cve": "CVE-2015-1282", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1282" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in fpdfsdk/src/javascript/Document.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document, related to the (1) Document::delay and (2) Document::DoFieldDelay functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1282", "url": "https://www.suse.com/security/cve/CVE-2015-1282" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1282", "url": "https://bugzilla.suse.com/939077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1282" }, { "cve": "CVE-2015-1283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1283" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1283", "url": "https://www.suse.com/security/cve/CVE-2015-1283" }, { "category": "external", "summary": "SUSE Bug 1034050 for CVE-2015-1283", "url": "https://bugzilla.suse.com/1034050" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1283", "url": "https://bugzilla.suse.com/939077" }, { "category": "external", "summary": "SUSE Bug 979441 for CVE-2015-1283", "url": "https://bugzilla.suse.com/979441" }, { "category": "external", "summary": "SUSE Bug 980391 for CVE-2015-1283", "url": "https://bugzilla.suse.com/980391" }, { "category": "external", "summary": "SUSE Bug 983985 for CVE-2015-1283", "url": "https://bugzilla.suse.com/983985" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1283" }, { "cve": "CVE-2015-1284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1284" } ], "notes": [ { "category": "general", "text": "The LocalFrame::isURLAllowed function in core/frame/LocalFrame.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly check for a page\u0027s maximum number of frames, which allows remote attackers to cause a denial of service (invalid count value and use-after-free) or possibly have unspecified other impact via crafted JavaScript code that makes many createElement calls for IFRAME elements.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1284", "url": "https://www.suse.com/security/cve/CVE-2015-1284" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1284", "url": "https://bugzilla.suse.com/939077" }, { "category": "external", "summary": "SUSE Bug 959178 for CVE-2015-1284", "url": "https://bugzilla.suse.com/959178" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1284" }, { "cve": "CVE-2015-1285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1285" } ], "notes": [ { "category": "general", "text": "The XSSAuditor::canonicalize function in core/html/parser/XSSAuditor.cpp in the XSS auditor in Blink, as used in Google Chrome before 44.0.2403.89, does not properly choose a truncation point, which makes it easier for remote attackers to obtain sensitive information via an unspecified linear-time attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1285", "url": "https://www.suse.com/security/cve/CVE-2015-1285" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1285", "url": "https://bugzilla.suse.com/939077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1285" }, { "cve": "CVE-2015-1286", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1286" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the V8ContextNativeHandler::GetModuleSystem function in extensions/renderer/v8_context_native_handler.cc in Google Chrome before 44.0.2403.89 allows remote attackers to inject arbitrary web script or HTML by leveraging the lack of a certain V8 context restriction, aka a Blink \"Universal XSS (UXSS).\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1286", "url": "https://www.suse.com/security/cve/CVE-2015-1286" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1286", "url": "https://bugzilla.suse.com/939077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1286" }, { "cve": "CVE-2015-1287", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1287" } ], "notes": [ { "category": "general", "text": "Blink, as used in Google Chrome before 44.0.2403.89, enables a quirks-mode exception that limits the cases in which a Cascading Style Sheets (CSS) document is required to have the text/css content type, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, related to core/fetch/CSSStyleSheetResource.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1287", "url": "https://www.suse.com/security/cve/CVE-2015-1287" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1287", "url": "https://bugzilla.suse.com/939077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1287" }, { "cve": "CVE-2015-1288", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1288" } ], "notes": [ { "category": "general", "text": "The Spellcheck API implementation in Google Chrome before 44.0.2403.89 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file, a related issue to CVE-2015-1263.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1288", "url": "https://www.suse.com/security/cve/CVE-2015-1288" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1288", "url": "https://bugzilla.suse.com/939077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1288" }, { "cve": "CVE-2015-1289", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1289" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 44.0.2403.89 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1289", "url": "https://www.suse.com/security/cve/CVE-2015-1289" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1289", "url": "https://bugzilla.suse.com/939077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1289" }, { "cve": "CVE-2015-1291", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1291" } ], "notes": [ { "category": "general", "text": "The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not check whether a node is expected, which allows remote attackers to bypass the Same Origin Policy or cause a denial of service (DOM tree corruption) via a web site with crafted JavaScript code and IFRAME elements.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1291", "url": "https://www.suse.com/security/cve/CVE-2015-1291" }, { "category": "external", "summary": "SUSE Bug 944144 for CVE-2015-1291", "url": "https://bugzilla.suse.com/944144" }, { "category": "external", "summary": "SUSE Bug 959178 for CVE-2015-1291", "url": "https://bugzilla.suse.com/959178" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1291" }, { "cve": "CVE-2015-1292", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1292" } ], "notes": [ { "category": "general", "text": "The NavigatorServiceWorker::serviceWorker function in modules/serviceworkers/NavigatorServiceWorker.cpp in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy by accessing a Service Worker.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1292", "url": "https://www.suse.com/security/cve/CVE-2015-1292" }, { "category": "external", "summary": "SUSE Bug 944144 for CVE-2015-1292", "url": "https://bugzilla.suse.com/944144" }, { "category": "external", "summary": "SUSE Bug 959178 for CVE-2015-1292", "url": "https://bugzilla.suse.com/959178" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1292" }, { "cve": "CVE-2015-1293", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1293" } ], "notes": [ { "category": "general", "text": "The DOM implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1293", "url": "https://www.suse.com/security/cve/CVE-2015-1293" }, { "category": "external", "summary": "SUSE Bug 944144 for CVE-2015-1293", "url": "https://bugzilla.suse.com/944144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1293" }, { "cve": "CVE-2015-1294", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1294" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the SkMatrix::invertNonIdentity function in core/SkMatrix.cpp in Skia, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering the use of matrix elements that lead to an infinite result during an inversion calculation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1294", "url": "https://www.suse.com/security/cve/CVE-2015-1294" }, { "category": "external", "summary": "SUSE Bug 944144 for CVE-2015-1294", "url": "https://bugzilla.suse.com/944144" }, { "category": "external", "summary": "SUSE Bug 959178 for CVE-2015-1294", "url": "https://bugzilla.suse.com/959178" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1294" }, { "cve": "CVE-2015-1295", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1295" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in the PrintWebViewHelper class in components/printing/renderer/print_web_view_helper.cc in Google Chrome before 45.0.2454.85 allow user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact by triggering nested IPC messages during preparation for printing, as demonstrated by messages associated with PDF documents in conjunction with messages about printer capabilities.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1295", "url": "https://www.suse.com/security/cve/CVE-2015-1295" }, { "category": "external", "summary": "SUSE Bug 944144 for CVE-2015-1295", "url": "https://bugzilla.suse.com/944144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1295" }, { "cve": "CVE-2015-1296", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1296" } ], "notes": [ { "category": "general", "text": "The UnescapeURLWithAdjustmentsImpl implementation in net/base/escape.cc in Google Chrome before 45.0.2454.85 does not prevent display of Unicode LOCK characters in the omnibox, which makes it easier for remote attackers to spoof the SSL lock icon by placing one of these characters at the end of a URL, as demonstrated by the omnibox in localizations for right-to-left languages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1296", "url": "https://www.suse.com/security/cve/CVE-2015-1296" }, { "category": "external", "summary": "SUSE Bug 944144 for CVE-2015-1296", "url": "https://bugzilla.suse.com/944144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1296" }, { "cve": "CVE-2015-1297", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1297" } ], "notes": [ { "category": "general", "text": "The WebRequest API implementation in extensions/browser/api/web_request/web_request_api.cc in Google Chrome before 45.0.2454.85 does not properly consider a request\u0027s source before accepting the request, which allows remote attackers to bypass intended access restrictions via a crafted (1) app or (2) extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1297", "url": "https://www.suse.com/security/cve/CVE-2015-1297" }, { "category": "external", "summary": "SUSE Bug 944144 for CVE-2015-1297", "url": "https://bugzilla.suse.com/944144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1297" }, { "cve": "CVE-2015-1298", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1298" } ], "notes": [ { "category": "general", "text": "The RuntimeEventRouter::OnExtensionUninstalled function in extensions/browser/api/runtime/runtime_api.cc in Google Chrome before 45.0.2454.85 does not ensure that the setUninstallURL preference corresponds to the URL of a web site, which allows user-assisted remote attackers to trigger access to an arbitrary URL via a crafted extension that is uninstalled.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1298", "url": "https://www.suse.com/security/cve/CVE-2015-1298" }, { "category": "external", "summary": "SUSE Bug 944144 for CVE-2015-1298", "url": "https://bugzilla.suse.com/944144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1298" }, { "cve": "CVE-2015-1299", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1299" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the shared-timer implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging erroneous timer firing, related to ThreadTimers.cpp and Timer.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1299", "url": "https://www.suse.com/security/cve/CVE-2015-1299" }, { "category": "external", "summary": "SUSE Bug 944144 for CVE-2015-1299", "url": "https://bugzilla.suse.com/944144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1299" }, { "cve": "CVE-2015-1300", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1300" } ], "notes": [ { "category": "general", "text": "The FrameFetchContext::updateTimingInfoForIFrameNavigation function in core/loader/FrameFetchContext.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not properly restrict the availability of IFRAME Resource Timing API times, which allows remote attackers to obtain sensitive information via crafted JavaScript code that leverages a history.back call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1300", "url": "https://www.suse.com/security/cve/CVE-2015-1300" }, { "category": "external", "summary": "SUSE Bug 944144 for CVE-2015-1300", "url": "https://bugzilla.suse.com/944144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1300" }, { "cve": "CVE-2015-1301", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1301" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 45.0.2454.85 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1301", "url": "https://www.suse.com/security/cve/CVE-2015-1301" }, { "category": "external", "summary": "SUSE Bug 944144 for CVE-2015-1301", "url": "https://bugzilla.suse.com/944144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1301" }, { "cve": "CVE-2015-1302", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1302" } ], "notes": [ { "category": "general", "text": "The PDF viewer in Google Chrome before 46.0.2490.86 does not properly restrict scripting messages and API exposure, which allows remote attackers to bypass the Same Origin Policy via an unintended embedder or unintended plugin loading, related to pdf.js and out_of_process_instance.cc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1302", "url": "https://www.suse.com/security/cve/CVE-2015-1302" }, { "category": "external", "summary": "SUSE Bug 954579 for CVE-2015-1302", "url": "https://bugzilla.suse.com/954579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1302" }, { "cve": "CVE-2015-1303", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1303" } ], "notes": [ { "category": "general", "text": "bindings/core/v8/V8DOMWrapper.h in Blink, as used in Google Chrome before 45.0.2454.101, does not perform a rethrow action to propagate information about a cross-context exception, which allows remote attackers to bypass the Same Origin Policy via a crafted HTML document containing an IFRAME element.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1303", "url": "https://www.suse.com/security/cve/CVE-2015-1303" }, { "category": "external", "summary": "SUSE Bug 947504 for CVE-2015-1303", "url": "https://bugzilla.suse.com/947504" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1303" }, { "cve": "CVE-2015-1304", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1304" } ], "notes": [ { "category": "general", "text": "object-observe.js in Google V8, as used in Google Chrome before 45.0.2454.101, does not properly restrict method calls on access-checked objects, which allows remote attackers to bypass the Same Origin Policy via a (1) observe or (2) getNotifier call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1304", "url": "https://www.suse.com/security/cve/CVE-2015-1304" }, { "category": "external", "summary": "SUSE Bug 947507 for CVE-2015-1304", "url": "https://bugzilla.suse.com/947507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1304" }, { "cve": "CVE-2015-6755", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6755" } ], "notes": [ { "category": "general", "text": "The ContainerNode::parserInsertBefore function in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 46.0.2490.71, proceeds with a DOM tree insertion in certain cases where a parent node no longer contains a child node, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6755", "url": "https://www.suse.com/security/cve/CVE-2015-6755" }, { "category": "external", "summary": "SUSE Bug 950290 for CVE-2015-6755", "url": "https://bugzilla.suse.com/950290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6755" }, { "cve": "CVE-2015-6756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6756" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the CPDFSDK_PageView implementation in fpdfsdk/src/fsdk_mgr.cpp in PDFium, as used in Google Chrome before 46.0.2490.71, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by leveraging mishandling of a focused annotation in a PDF document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6756", "url": "https://www.suse.com/security/cve/CVE-2015-6756" }, { "category": "external", "summary": "SUSE Bug 950290 for CVE-2015-6756", "url": "https://bugzilla.suse.com/950290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6756" }, { "cve": "CVE-2015-6757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6757" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in content/browser/service_worker/embedded_worker_instance.cc in the ServiceWorker implementation in Google Chrome before 46.0.2490.71 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging object destruction in a callback.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6757", "url": "https://www.suse.com/security/cve/CVE-2015-6757" }, { "category": "external", "summary": "SUSE Bug 950290 for CVE-2015-6757", "url": "https://bugzilla.suse.com/950290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6757" }, { "cve": "CVE-2015-6758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6758" } ], "notes": [ { "category": "general", "text": "The CPDF_Document::GetPage function in fpdfapi/fpdf_parser/fpdf_parser_document.cpp in PDFium, as used in Google Chrome before 46.0.2490.71, does not properly perform a cast of a dictionary object, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6758", "url": "https://www.suse.com/security/cve/CVE-2015-6758" }, { "category": "external", "summary": "SUSE Bug 950290 for CVE-2015-6758", "url": "https://bugzilla.suse.com/950290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6758" }, { "cve": "CVE-2015-6759", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6759" } ], "notes": [ { "category": "general", "text": "The shouldTreatAsUniqueOrigin function in platform/weborigin/SecurityOrigin.cpp in Blink, as used in Google Chrome before 46.0.2490.71, does not ensure that the origin of a LocalStorage resource is considered unique, which allows remote attackers to obtain sensitive information via vectors involving a blob: URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6759", "url": "https://www.suse.com/security/cve/CVE-2015-6759" }, { "category": "external", "summary": "SUSE Bug 950290 for CVE-2015-6759", "url": "https://bugzilla.suse.com/950290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6759" }, { "cve": "CVE-2015-6760", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6760" } ], "notes": [ { "category": "general", "text": "The Image11::map function in renderer/d3d/d3d11/Image11.cpp in libANGLE, as used in Google Chrome before 46.0.2490.71, mishandles mapping failures after device-lost events, which allows remote attackers to cause a denial of service (invalid read or write) or possibly have unspecified other impact via vectors involving a removed device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6760", "url": "https://www.suse.com/security/cve/CVE-2015-6760" }, { "category": "external", "summary": "SUSE Bug 950290 for CVE-2015-6760", "url": "https://bugzilla.suse.com/950290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6760" }, { "cve": "CVE-2015-6761", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6761" } ], "notes": [ { "category": "general", "text": "The update_dimensions function in libavcodec/vp8.c in FFmpeg through 2.8.1, as used in Google Chrome before 46.0.2490.71 and other products, relies on a coefficient-partition count during multi-threaded operation, which allows remote attackers to cause a denial of service (race condition and memory corruption) or possibly have unspecified other impact via a crafted WebM file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6761", "url": "https://www.suse.com/security/cve/CVE-2015-6761" }, { "category": "external", "summary": "SUSE Bug 950290 for CVE-2015-6761", "url": "https://bugzilla.suse.com/950290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6761" }, { "cve": "CVE-2015-6762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6762" } ], "notes": [ { "category": "general", "text": "The CSSFontFaceSrcValue::fetch function in core/css/CSSFontFaceSrcValue.cpp in the Cascading Style Sheets (CSS) implementation in Blink, as used in Google Chrome before 46.0.2490.71, does not use the CORS cross-origin request algorithm when a font\u0027s URL appears to be a same-origin URL, which allows remote web servers to bypass the Same Origin Policy via a redirect.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6762", "url": "https://www.suse.com/security/cve/CVE-2015-6762" }, { "category": "external", "summary": "SUSE Bug 950290 for CVE-2015-6762", "url": "https://bugzilla.suse.com/950290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6762" }, { "cve": "CVE-2015-6763", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6763" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 46.0.2490.71 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6763", "url": "https://www.suse.com/security/cve/CVE-2015-6763" }, { "category": "external", "summary": "SUSE Bug 950290 for CVE-2015-6763", "url": "https://bugzilla.suse.com/950290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6763" }, { "cve": "CVE-2015-6764", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6764" } ], "notes": [ { "category": "general", "text": "The BasicJsonStringifier::SerializeJSArray function in json-stringifier.h in the JSON stringifier in Google V8, as used in Google Chrome before 47.0.2526.73, improperly loads array elements, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6764", "url": "https://www.suse.com/security/cve/CVE-2015-6764" }, { "category": "external", "summary": "SUSE Bug 956902 for CVE-2015-6764", "url": "https://bugzilla.suse.com/956902" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6764", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-6764" }, { "cve": "CVE-2015-6765", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6765" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in content/browser/appcache/appcache_update_job.cc in Google Chrome before 47.0.2526.73 allows remote attackers to execute arbitrary code or cause a denial of service by leveraging the mishandling of AppCache update jobs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6765", "url": "https://www.suse.com/security/cve/CVE-2015-6765" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6765", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-6765" }, { "cve": "CVE-2015-6766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6766" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the AppCache implementation in Google Chrome before 47.0.2526.73 allows remote attackers with renderer access to cause a denial of service or possibly have unspecified other impact by leveraging incorrect AppCacheUpdateJob behavior associated with duplicate cache selection.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6766", "url": "https://www.suse.com/security/cve/CVE-2015-6766" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6766", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6766" }, { "cve": "CVE-2015-6767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6767" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in content/browser/appcache/appcache_dispatcher_host.cc in the AppCache implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect pointer maintenance associated with certain callbacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6767", "url": "https://www.suse.com/security/cve/CVE-2015-6767" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6767", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6767" }, { "cve": "CVE-2015-6768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6768" } ], "notes": [ { "category": "general", "text": "The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6770.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6768", "url": "https://www.suse.com/security/cve/CVE-2015-6768" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6768", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6768" }, { "cve": "CVE-2015-6769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6769" } ], "notes": [ { "category": "general", "text": "The provisional-load commit implementation in WebKit/Source/bindings/core/v8/WindowProxy.cpp in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy by leveraging a delay in window proxy clearing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6769", "url": "https://www.suse.com/security/cve/CVE-2015-6769" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6769", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6769" }, { "cve": "CVE-2015-6770", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6770" } ], "notes": [ { "category": "general", "text": "The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6768.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6770", "url": "https://www.suse.com/security/cve/CVE-2015-6770" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6770", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6770" }, { "cve": "CVE-2015-6771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6771" } ], "notes": [ { "category": "general", "text": "js/array.js in Google V8, as used in Google Chrome before 47.0.2526.73, improperly implements certain map and filter operations for arrays, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6771", "url": "https://www.suse.com/security/cve/CVE-2015-6771" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6771", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6771" }, { "cve": "CVE-2015-6772", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6772" } ], "notes": [ { "category": "general", "text": "The DOM implementation in Blink, as used in Google Chrome before 47.0.2526.73, does not prevent javascript: URL navigation while a document is being detached, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that improperly interacts with a plugin.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6772", "url": "https://www.suse.com/security/cve/CVE-2015-6772" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6772", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6772" }, { "cve": "CVE-2015-6773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6773" } ], "notes": [ { "category": "general", "text": "The convolution implementation in Skia, as used in Google Chrome before 47.0.2526.73, does not properly constrain row lengths, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted graphics data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6773", "url": "https://www.suse.com/security/cve/CVE-2015-6773" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6773", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6773" }, { "cve": "CVE-2015-6774", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6774" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the GetLoadTimes function in renderer/loadtimes_extension_bindings.cc in the Extensions implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that modifies a pointer used for reporting loadTimes data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6774", "url": "https://www.suse.com/security/cve/CVE-2015-6774" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6774", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6774" }, { "cve": "CVE-2015-6775", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6775" } ], "notes": [ { "category": "general", "text": "fpdfsdk/src/jsapi/fxjs_v8.cpp in PDFium, as used in Google Chrome before 47.0.2526.73, does not use signatures, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage \"type confusion.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6775", "url": "https://www.suse.com/security/cve/CVE-2015-6775" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6775", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6775" }, { "cve": "CVE-2015-6776", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6776" } ], "notes": [ { "category": "general", "text": "The opj_dwt_decode_1* functions in dwt.c in OpenJPEG, as used in PDFium in Google Chrome before 47.0.2526.73, allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during a discrete wavelet transform.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6776", "url": "https://www.suse.com/security/cve/CVE-2015-6776" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6776", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-6776" }, { "cve": "CVE-2015-6777", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6777" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the ContainerNode::notifyNodeInsertedInternal function in WebKit/Source/core/dom/ContainerNode.cpp in the DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOMCharacterDataModified events for certain detached-subtree insertions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6777", "url": "https://www.suse.com/security/cve/CVE-2015-6777" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6777", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6777" }, { "cve": "CVE-2015-6778", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6778" } ], "notes": [ { "category": "general", "text": "The CJBig2_SymbolDict class in fxcodec/jbig2/JBig2_SymbolDict.cpp in PDFium, as used in Google Chrome before 47.0.2526.73, allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a PDF document containing crafted data with JBIG2 compression.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6778", "url": "https://www.suse.com/security/cve/CVE-2015-6778" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6778", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6778" }, { "cve": "CVE-2015-6779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6779" } ], "notes": [ { "category": "general", "text": "PDFium, as used in Google Chrome before 47.0.2526.73, does not properly restrict use of chrome: URLs, which allows remote attackers to bypass intended scheme restrictions via a crafted PDF document, as demonstrated by a document with a link to a chrome://settings URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6779", "url": "https://www.suse.com/security/cve/CVE-2015-6779" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6779", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-6779" }, { "cve": "CVE-2015-6780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6780" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the Infobars implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site, related to browser/ui/views/website_settings/website_settings_popup_view.cc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6780", "url": "https://www.suse.com/security/cve/CVE-2015-6780" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6780", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-6780" }, { "cve": "CVE-2015-6781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6781" } ], "notes": [ { "category": "general", "text": "Integer overflow in the FontData::Bound function in data/font_data.cc in Google sfntly, as used in Google Chrome before 47.0.2526.73, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted offset or length value within font data in an SFNT container.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6781", "url": "https://www.suse.com/security/cve/CVE-2015-6781" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6781", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-6781" }, { "cve": "CVE-2015-6782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6782" } ], "notes": [ { "category": "general", "text": "The Document::open function in WebKit/Source/core/dom/Document.cpp in Google Chrome before 47.0.2526.73 does not ensure that page-dismissal event handling is compatible with modal-dialog blocking, which makes it easier for remote attackers to spoof Omnibox content via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6782", "url": "https://www.suse.com/security/cve/CVE-2015-6782" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6782", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-6782" }, { "cve": "CVE-2015-6783", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6783" } ], "notes": [ { "category": "general", "text": "The FindStartOffsetOfFileInZipFile function in crazy_linker_zip.cpp in crazy_linker (aka Crazy Linker) in Android 5.x and 6.x, as used in Google Chrome before 47.0.2526.73, improperly searches for an EOCD record, which allows attackers to bypass a signature-validation requirement via a crafted ZIP archive.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6783", "url": "https://www.suse.com/security/cve/CVE-2015-6783" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6783", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-6783" }, { "cve": "CVE-2015-6784", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6784" } ], "notes": [ { "category": "general", "text": "The page serializer in Google Chrome before 47.0.2526.73 mishandles Mark of the Web (MOTW) comments for URLs containing a \"--\" sequence, which might allow remote attackers to inject HTML via a crafted URL, as demonstrated by an initial http://example.com?-- substring.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6784", "url": "https://www.suse.com/security/cve/CVE-2015-6784" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6784", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-6784" }, { "cve": "CVE-2015-6785", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6785" } ], "notes": [ { "category": "general", "text": "The CSPSource::hostMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Google Chrome before 47.0.2526.73 accepts an x.y hostname as a match for a *.x.y pattern, which might allow remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a policy that was intended to be specific to subdomains.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6785", "url": "https://www.suse.com/security/cve/CVE-2015-6785" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6785", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-6785" }, { "cve": "CVE-2015-6786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6786" } ], "notes": [ { "category": "general", "text": "The CSPSourceList::matches function in WebKit/Source/core/frame/csp/CSPSourceList.cpp in the Content Security Policy (CSP) implementation in Google Chrome before 47.0.2526.73 accepts a blob:, data:, or filesystem: URL as a match for a * pattern, which allows remote attackers to bypass intended scheme restrictions in opportunistic circumstances by leveraging a policy that relies on this pattern.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6786", "url": "https://www.suse.com/security/cve/CVE-2015-6786" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6786", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-6786" }, { "cve": "CVE-2015-6787", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6787" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 47.0.2526.73 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6787", "url": "https://www.suse.com/security/cve/CVE-2015-6787" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6787", "url": "https://bugzilla.suse.com/957519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-6787" }, { "cve": "CVE-2015-6788", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6788" } ], "notes": [ { "category": "general", "text": "The ObjectBackedNativeHandler class in extensions/renderer/object_backed_native_handler.cc in the extensions subsystem in Google Chrome before 47.0.2526.80 improperly implements handler functions, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage \"type confusion.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6788", "url": "https://www.suse.com/security/cve/CVE-2015-6788" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6788", "url": "https://bugzilla.suse.com/957519" }, { "category": "external", "summary": "SUSE Bug 958481 for CVE-2015-6788", "url": "https://bugzilla.suse.com/958481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-6788" }, { "cve": "CVE-2015-6789", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6789" } ], "notes": [ { "category": "general", "text": "Race condition in the MutationObserver implementation in Blink, as used in Google Chrome before 47.0.2526.80, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact by leveraging unanticipated object deletion.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6789", "url": "https://www.suse.com/security/cve/CVE-2015-6789" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6789", "url": "https://bugzilla.suse.com/957519" }, { "category": "external", "summary": "SUSE Bug 958481 for CVE-2015-6789", "url": "https://bugzilla.suse.com/958481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-6789" }, { "cve": "CVE-2015-6790", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6790" } ], "notes": [ { "category": "general", "text": "The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6790", "url": "https://www.suse.com/security/cve/CVE-2015-6790" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6790", "url": "https://bugzilla.suse.com/957519" }, { "category": "external", "summary": "SUSE Bug 958481 for CVE-2015-6790", "url": "https://bugzilla.suse.com/958481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-6790" }, { "cve": "CVE-2015-6791", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6791" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 47.0.2526.80 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6791", "url": "https://www.suse.com/security/cve/CVE-2015-6791" }, { "category": "external", "summary": "SUSE Bug 957519 for CVE-2015-6791", "url": "https://bugzilla.suse.com/957519" }, { "category": "external", "summary": "SUSE Bug 958481 for CVE-2015-6791", "url": "https://bugzilla.suse.com/958481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-6791" }, { "cve": "CVE-2015-6792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6792" } ], "notes": [ { "category": "general", "text": "The MIDI subsystem in Google Chrome before 47.0.2526.106 does not properly handle the sending of data, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors, related to midi_manager.cc, midi_manager_alsa.cc, and midi_manager_mac.cc, a different vulnerability than CVE-2015-8664.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6792", "url": "https://www.suse.com/security/cve/CVE-2015-6792" }, { "category": "external", "summary": "SUSE Bug 959458 for CVE-2015-6792", "url": "https://bugzilla.suse.com/959458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-6792" }, { "cve": "CVE-2015-7834", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7834" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7834", "url": "https://www.suse.com/security/cve/CVE-2015-7834" }, { "category": "external", "summary": "SUSE Bug 950290 for CVE-2015-7834", "url": "https://bugzilla.suse.com/950290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7834" }, { "cve": "CVE-2015-8126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8126" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8126", "url": "https://www.suse.com/security/cve/CVE-2015-8126" }, { "category": "external", "summary": "SUSE Bug 954980 for CVE-2015-8126", "url": "https://bugzilla.suse.com/954980" }, { "category": "external", "summary": "SUSE Bug 958198 for CVE-2015-8126", "url": "https://bugzilla.suse.com/958198" }, { "category": "external", "summary": "SUSE Bug 960402 for CVE-2015-8126", "url": "https://bugzilla.suse.com/960402" }, { "category": "external", "summary": "SUSE Bug 962743 for CVE-2015-8126", "url": "https://bugzilla.suse.com/962743" }, { "category": "external", "summary": "SUSE Bug 963937 for CVE-2015-8126", "url": "https://bugzilla.suse.com/963937" }, { "category": "external", "summary": "SUSE Bug 969333 for CVE-2015-8126", "url": "https://bugzilla.suse.com/969333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8126" }, { "cve": "CVE-2016-1612", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1612" } ], "notes": [ { "category": "general", "text": "The LoadIC::UpdateCaches function in ic/ic.cc in Google V8, as used in Google Chrome before 48.0.2564.82, does not ensure receiver compatibility before performing a cast of an unspecified variable, which allows remote attackers to cause a denial of service or possibly have unknown other impact via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1612", "url": "https://www.suse.com/security/cve/CVE-2016-1612" }, { "category": "external", "summary": "SUSE Bug 963184 for CVE-2016-1612", "url": "https://bugzilla.suse.com/963184" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1612" }, { "cve": "CVE-2016-1613", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1613" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in the formfiller implementation in PDFium, as used in Google Chrome before 48.0.2564.82, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document, related to improper tracking of the destruction of (1) IPWL_FocusHandler and (2) IPWL_Provider objects.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1613", "url": "https://www.suse.com/security/cve/CVE-2016-1613" }, { "category": "external", "summary": "SUSE Bug 963185 for CVE-2016-1613", "url": "https://bugzilla.suse.com/963185" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1613" }, { "cve": "CVE-2016-1614", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1614" } ], "notes": [ { "category": "general", "text": "The UnacceleratedImageBufferSurface class in WebKit/Source/platform/graphics/UnacceleratedImageBufferSurface.cpp in Blink, as used in Google Chrome before 48.0.2564.82, mishandles the initialization mode, which allows remote attackers to obtain sensitive information from process memory via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1614", "url": "https://www.suse.com/security/cve/CVE-2016-1614" }, { "category": "external", "summary": "SUSE Bug 963186 for CVE-2016-1614", "url": "https://bugzilla.suse.com/963186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1614" }, { "cve": "CVE-2016-1615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1615" } ], "notes": [ { "category": "general", "text": "The Omnibox implementation in Google Chrome before 48.0.2564.82 allows remote attackers to spoof a document\u0027s origin via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1615", "url": "https://www.suse.com/security/cve/CVE-2016-1615" }, { "category": "external", "summary": "SUSE Bug 963187 for CVE-2016-1615", "url": "https://bugzilla.suse.com/963187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1615" }, { "cve": "CVE-2016-1616", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1616" } ], "notes": [ { "category": "general", "text": "The CustomButton::AcceleratorPressed function in ui/views/controls/button/custom_button.cc in Google Chrome before 48.0.2564.82 allows remote attackers to spoof URLs via vectors involving an unfocused custom button.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1616", "url": "https://www.suse.com/security/cve/CVE-2016-1616" }, { "category": "external", "summary": "SUSE Bug 963188 for CVE-2016-1616", "url": "https://bugzilla.suse.com/963188" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1616" }, { "cve": "CVE-2016-1617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1617" } ], "notes": [ { "category": "general", "text": "The CSPSource::schemeMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 48.0.2564.82, does not apply http policies to https URLs and does not apply ws policies to wss URLs, which makes it easier for remote attackers to determine whether a specific HSTS web site has been visited by reading a CSP report.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1617", "url": "https://www.suse.com/security/cve/CVE-2016-1617" }, { "category": "external", "summary": "SUSE Bug 963189 for CVE-2016-1617", "url": "https://bugzilla.suse.com/963189" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1617" }, { "cve": "CVE-2016-1618", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1618" } ], "notes": [ { "category": "general", "text": "Blink, as used in Google Chrome before 48.0.2564.82, does not ensure that a proper cryptographicallyRandomValues random number generator is used, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1618", "url": "https://www.suse.com/security/cve/CVE-2016-1618" }, { "category": "external", "summary": "SUSE Bug 963190 for CVE-2016-1618", "url": "https://bugzilla.suse.com/963190" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1618" }, { "cve": "CVE-2016-1619", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1619" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the (1) sycc422_to_rgb and (2) sycc444_to_rgb functions in fxcodec/codec/fx_codec_jpx_opj.cpp in PDFium, as used in Google Chrome before 48.0.2564.82, allow remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted PDF document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1619", "url": "https://www.suse.com/security/cve/CVE-2016-1619" }, { "category": "external", "summary": "SUSE Bug 963191 for CVE-2016-1619", "url": "https://bugzilla.suse.com/963191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1619" }, { "cve": "CVE-2016-1620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1620" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 48.0.2564.82 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1620", "url": "https://www.suse.com/security/cve/CVE-2016-1620" }, { "category": "external", "summary": "SUSE Bug 963192 for CVE-2016-1620", "url": "https://bugzilla.suse.com/963192" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1620" }, { "cve": "CVE-2016-1622", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1622" } ], "notes": [ { "category": "general", "text": "The Extensions subsystem in Google Chrome before 48.0.2564.109 does not prevent use of the Object.defineProperty method to override intended extension behavior, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1622", "url": "https://www.suse.com/security/cve/CVE-2016-1622" }, { "category": "external", "summary": "SUSE Bug 965999 for CVE-2016-1622", "url": "https://bugzilla.suse.com/965999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1622" }, { "cve": "CVE-2016-1623", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1623" } ], "notes": [ { "category": "general", "text": "The DOM implementation in Google Chrome before 48.0.2564.109 does not properly restrict frame-attach operations from occurring during or after frame-detach operations, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, related to FrameLoader.cpp, HTMLFrameOwnerElement.h, LocalFrame.cpp, and WebLocalFrameImpl.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1623", "url": "https://www.suse.com/security/cve/CVE-2016-1623" }, { "category": "external", "summary": "SUSE Bug 965999 for CVE-2016-1623", "url": "https://bugzilla.suse.com/965999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1623" }, { "cve": "CVE-2016-1624", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1624" } ], "notes": [ { "category": "general", "text": "Integer underflow in the ProcessCommandsInternal function in dec/decode.c in Brotli, as used in Google Chrome before 48.0.2564.109, allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted data with brotli compression.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1624", "url": "https://www.suse.com/security/cve/CVE-2016-1624" }, { "category": "external", "summary": "SUSE Bug 965999 for CVE-2016-1624", "url": "https://bugzilla.suse.com/965999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1624" }, { "cve": "CVE-2016-1625", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1625" } ], "notes": [ { "category": "general", "text": "The Chrome Instant feature in Google Chrome before 48.0.2564.109 does not ensure that a New Tab Page (NTP) navigation target is on the most-visited or suggestions list, which allows remote attackers to bypass intended restrictions via unspecified vectors, related to instant_service.cc and search_tab_helper.cc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1625", "url": "https://www.suse.com/security/cve/CVE-2016-1625" }, { "category": "external", "summary": "SUSE Bug 965999 for CVE-2016-1625", "url": "https://bugzilla.suse.com/965999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1625" }, { "cve": "CVE-2016-1626", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1626" } ], "notes": [ { "category": "general", "text": "The opj_pi_update_decode_poc function in pi.c in OpenJPEG, as used in PDFium in Google Chrome before 48.0.2564.109, miscalculates a certain layer index value, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1626", "url": "https://www.suse.com/security/cve/CVE-2016-1626" }, { "category": "external", "summary": "SUSE Bug 965999 for CVE-2016-1626", "url": "https://bugzilla.suse.com/965999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1626" }, { "cve": "CVE-2016-1627", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1627" } ], "notes": [ { "category": "general", "text": "The Developer Tools (aka DevTools) subsystem in Google Chrome before 48.0.2564.109 does not validate URL schemes and ensure that the remoteBase parameter is associated with a chrome-devtools-frontend.appspot.com URL, which allows remote attackers to bypass intended access restrictions via a crafted URL, related to browser/devtools/devtools_ui_bindings.cc and WebKit/Source/devtools/front_end/Runtime.js.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1627", "url": "https://www.suse.com/security/cve/CVE-2016-1627" }, { "category": "external", "summary": "SUSE Bug 965999 for CVE-2016-1627", "url": "https://bugzilla.suse.com/965999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1627" }, { "cve": "CVE-2016-1629", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1629" } ], "notes": [ { "category": "general", "text": "Google Chrome before 48.0.2564.116 allows remote attackers to bypass the Blink Same Origin Policy and a sandbox protection mechanism via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1629", "url": "https://www.suse.com/security/cve/CVE-2016-1629" }, { "category": "external", "summary": "SUSE Bug 967376 for CVE-2016-1629", "url": "https://bugzilla.suse.com/967376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1629" }, { "cve": "CVE-2016-1630", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1630" } ], "notes": [ { "category": "general", "text": "The ContainerNode::parserRemoveChild function in WebKit/Source/core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 49.0.2623.75, mishandles widget updates, which makes it easier for remote attackers to bypass the Same Origin Policy via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1630", "url": "https://www.suse.com/security/cve/CVE-2016-1630" }, { "category": "external", "summary": "SUSE Bug 969333 for CVE-2016-1630", "url": "https://bugzilla.suse.com/969333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1630" }, { "cve": "CVE-2016-1631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1631" } ], "notes": [ { "category": "general", "text": "The PPB_Flash_MessageLoop_Impl::InternalRun function in content/renderer/pepper/ppb_flash_message_loop_impl.cc in the Pepper plugin in Google Chrome before 49.0.2623.75 mishandles nested message loops, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1631", "url": "https://www.suse.com/security/cve/CVE-2016-1631" }, { "category": "external", "summary": "SUSE Bug 969333 for CVE-2016-1631", "url": "https://bugzilla.suse.com/969333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1631" }, { "cve": "CVE-2016-1632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1632" } ], "notes": [ { "category": "general", "text": "The Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly maintain own properties, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code that triggers an incorrect cast, related to extensions/renderer/v8_helpers.h and gin/converter.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1632", "url": "https://www.suse.com/security/cve/CVE-2016-1632" }, { "category": "external", "summary": "SUSE Bug 969333 for CVE-2016-1632", "url": "https://bugzilla.suse.com/969333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1632" }, { "cve": "CVE-2016-1633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1633" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1633", "url": "https://www.suse.com/security/cve/CVE-2016-1633" }, { "category": "external", "summary": "SUSE Bug 969333 for CVE-2016-1633", "url": "https://bugzilla.suse.com/969333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1633" }, { "cve": "CVE-2016-1634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1634" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1634", "url": "https://www.suse.com/security/cve/CVE-2016-1634" }, { "category": "external", "summary": "SUSE Bug 969333 for CVE-2016-1634", "url": "https://bugzilla.suse.com/969333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1634" }, { "cve": "CVE-2016-1635", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1635" } ], "notes": [ { "category": "general", "text": "extensions/renderer/render_frame_observer_natives.cc in Google Chrome before 49.0.2623.75 does not properly consider object lifetimes and re-entrancy issues during OnDocumentElementCreated handling, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1635", "url": "https://www.suse.com/security/cve/CVE-2016-1635" }, { "category": "external", "summary": "SUSE Bug 969333 for CVE-2016-1635", "url": "https://bugzilla.suse.com/969333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1635" }, { "cve": "CVE-2016-1636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1636" } ], "notes": [ { "category": "general", "text": "The PendingScript::notifyFinished function in WebKit/Source/core/dom/PendingScript.cpp in Google Chrome before 49.0.2623.75 relies on memory-cache information about integrity-check occurrences instead of integrity-check successes, which allows remote attackers to bypass the Subresource Integrity (aka SRI) protection mechanism by triggering two loads of the same resource.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1636", "url": "https://www.suse.com/security/cve/CVE-2016-1636" }, { "category": "external", "summary": "SUSE Bug 969333 for CVE-2016-1636", "url": "https://bugzilla.suse.com/969333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1636" }, { "cve": "CVE-2016-1637", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1637" } ], "notes": [ { "category": "general", "text": "The SkATan2_255 function in effects/gradients/SkSweepGradient.cpp in Skia, as used in Google Chrome before 49.0.2623.75, mishandles arctangent calculations, which allows remote attackers to obtain sensitive information via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1637", "url": "https://www.suse.com/security/cve/CVE-2016-1637" }, { "category": "external", "summary": "SUSE Bug 969333 for CVE-2016-1637", "url": "https://bugzilla.suse.com/969333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1637" }, { "cve": "CVE-2016-1638", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1638" } ], "notes": [ { "category": "general", "text": "extensions/renderer/resources/platform_app.js in the Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly restrict use of Web APIs, which allows remote attackers to bypass intended access restrictions via a crafted platform app.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1638", "url": "https://www.suse.com/security/cve/CVE-2016-1638" }, { "category": "external", "summary": "SUSE Bug 969333 for CVE-2016-1638", "url": "https://bugzilla.suse.com/969333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1638" }, { "cve": "CVE-2016-1639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1639" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in browser/extensions/api/webrtc_audio_private/webrtc_audio_private_api.cc in the WebRTC Audio Private API implementation in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect reliance on the resource context pointer.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1639", "url": "https://www.suse.com/security/cve/CVE-2016-1639" }, { "category": "external", "summary": "SUSE Bug 969333 for CVE-2016-1639", "url": "https://bugzilla.suse.com/969333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1639" }, { "cve": "CVE-2016-1640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1640" } ], "notes": [ { "category": "general", "text": "The Web Store inline-installer implementation in the Extensions UI in Google Chrome before 49.0.2623.75 does not block installations upon deletion of an installation frame, which makes it easier for remote attackers to trick a user into believing that an installation request originated from the user\u0027s next navigation target via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1640", "url": "https://www.suse.com/security/cve/CVE-2016-1640" }, { "category": "external", "summary": "SUSE Bug 969333 for CVE-2016-1640", "url": "https://bugzilla.suse.com/969333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1640" }, { "cve": "CVE-2016-1641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1641" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an image download after a certain data structure is deleted, as demonstrated by a favicon.ico download.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1641", "url": "https://www.suse.com/security/cve/CVE-2016-1641" }, { "category": "external", "summary": "SUSE Bug 969333 for CVE-2016-1641", "url": "https://bugzilla.suse.com/969333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1641" }, { "cve": "CVE-2016-1642", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1642" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 49.0.2623.75 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1642", "url": "https://www.suse.com/security/cve/CVE-2016-1642" }, { "category": "external", "summary": "SUSE Bug 969333 for CVE-2016-1642", "url": "https://bugzilla.suse.com/969333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1642" }, { "cve": "CVE-2016-1643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1643" } ], "notes": [ { "category": "general", "text": "The ImageInputType::ensurePrimaryContent function in WebKit/Source/core/html/forms/ImageInputType.cpp in Blink, as used in Google Chrome before 49.0.2623.87, does not properly maintain the user agent shadow DOM, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage \"type confusion.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1643", "url": "https://www.suse.com/security/cve/CVE-2016-1643" }, { "category": "external", "summary": "SUSE Bug 970514 for CVE-2016-1643", "url": "https://bugzilla.suse.com/970514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1643" }, { "cve": "CVE-2016-1644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1644" } ], "notes": [ { "category": "general", "text": "WebKit/Source/core/layout/LayoutObject.cpp in Blink, as used in Google Chrome before 49.0.2623.87, does not properly restrict relayout scheduling, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted HTML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1644", "url": "https://www.suse.com/security/cve/CVE-2016-1644" }, { "category": "external", "summary": "SUSE Bug 970509 for CVE-2016-1644", "url": "https://bugzilla.suse.com/970509" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1644" }, { "cve": "CVE-2016-1645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1645" } ], "notes": [ { "category": "general", "text": "Multiple integer signedness errors in the opj_j2k_update_image_data function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 49.0.2623.87, allow remote attackers to cause a denial of service (incorrect cast and out-of-bounds write) or possibly have unspecified other impact via crafted JPEG 2000 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1645", "url": "https://www.suse.com/security/cve/CVE-2016-1645" }, { "category": "external", "summary": "SUSE Bug 970511 for CVE-2016-1645", "url": "https://bugzilla.suse.com/970511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1645" }, { "cve": "CVE-2016-1646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1646" } ], "notes": [ { "category": "general", "text": "The Array.prototype.concat implementation in builtins.cc in Google V8, as used in Google Chrome before 49.0.2623.108, does not properly consider element data types, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1646", "url": "https://www.suse.com/security/cve/CVE-2016-1646" }, { "category": "external", "summary": "SUSE Bug 972834 for CVE-2016-1646", "url": "https://bugzilla.suse.com/972834" }, { "category": "external", "summary": "SUSE Bug 973166 for CVE-2016-1646", "url": "https://bugzilla.suse.com/973166" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1646" }, { "cve": "CVE-2016-1647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1647" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the RenderWidgetHostImpl::Destroy function in content/browser/renderer_host/render_widget_host_impl.cc in the Navigation implementation in Google Chrome before 49.0.2623.108 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1647", "url": "https://www.suse.com/security/cve/CVE-2016-1647" }, { "category": "external", "summary": "SUSE Bug 972834 for CVE-2016-1647", "url": "https://bugzilla.suse.com/972834" }, { "category": "external", "summary": "SUSE Bug 973166 for CVE-2016-1647", "url": "https://bugzilla.suse.com/973166" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1647" }, { "cve": "CVE-2016-1648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1648" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the GetLoadTimes function in renderer/loadtimes_extension_bindings.cc in the Extensions implementation in Google Chrome before 49.0.2623.108 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1648", "url": "https://www.suse.com/security/cve/CVE-2016-1648" }, { "category": "external", "summary": "SUSE Bug 972834 for CVE-2016-1648", "url": "https://bugzilla.suse.com/972834" }, { "category": "external", "summary": "SUSE Bug 973166 for CVE-2016-1648", "url": "https://bugzilla.suse.com/973166" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1648" }, { "cve": "CVE-2016-1649", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1649" } ], "notes": [ { "category": "general", "text": "The Program::getUniformInternal function in Program.cpp in libANGLE, as used in Google Chrome before 49.0.2623.108, does not properly handle a certain data-type mismatch, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted shader stages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1649", "url": "https://www.suse.com/security/cve/CVE-2016-1649" }, { "category": "external", "summary": "SUSE Bug 972834 for CVE-2016-1649", "url": "https://bugzilla.suse.com/972834" }, { "category": "external", "summary": "SUSE Bug 973166 for CVE-2016-1649", "url": "https://bugzilla.suse.com/973166" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1649" }, { "cve": "CVE-2016-1650", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1650" } ], "notes": [ { "category": "general", "text": "The PageCaptureSaveAsMHTMLFunction::ReturnFailure function in browser/extensions/api/page_capture/page_capture_api.cc in Google Chrome before 49.0.2623.108 allows attackers to cause a denial of service or possibly have unspecified other impact by triggering an error in creating an MHTML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1650", "url": "https://www.suse.com/security/cve/CVE-2016-1650" }, { "category": "external", "summary": "SUSE Bug 972834 for CVE-2016-1650", "url": "https://bugzilla.suse.com/972834" }, { "category": "external", "summary": "SUSE Bug 973166 for CVE-2016-1650", "url": "https://bugzilla.suse.com/973166" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1650" }, { "cve": "CVE-2016-1651", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1651" } ], "notes": [ { "category": "general", "text": "fxcodec/codec/fx_codec_jpx_opj.cpp in PDFium, as used in Google Chrome before 50.0.2661.75, does not properly implement the sycc420_to_rgb and sycc422_to_rgb functions, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via crafted JPEG 2000 data in a PDF document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1651", "url": "https://www.suse.com/security/cve/CVE-2016-1651" }, { "category": "external", "summary": "SUSE Bug 975572 for CVE-2016-1651", "url": "https://bugzilla.suse.com/975572" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1651" }, { "cve": "CVE-2016-1652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1652" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the Extensions subsystem in Google Chrome before 50.0.2661.75 allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka \"Universal XSS (UXSS).\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1652", "url": "https://www.suse.com/security/cve/CVE-2016-1652" }, { "category": "external", "summary": "SUSE Bug 975572 for CVE-2016-1652", "url": "https://bugzilla.suse.com/975572" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1652" }, { "cve": "CVE-2016-1653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1653" } ], "notes": [ { "category": "general", "text": "The LoadBuffer implementation in Google V8, as used in Google Chrome before 50.0.2661.75, mishandles data types, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds write operation, related to compiler/pipeline.cc and compiler/simplified-lowering.cc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1653", "url": "https://www.suse.com/security/cve/CVE-2016-1653" }, { "category": "external", "summary": "SUSE Bug 975572 for CVE-2016-1653", "url": "https://bugzilla.suse.com/975572" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1653" }, { "cve": "CVE-2016-1654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1654" } ], "notes": [ { "category": "general", "text": "The media subsystem in Google Chrome before 50.0.2661.75 does not initialize an unspecified data structure, which allows remote attackers to cause a denial of service (invalid read operation) via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1654", "url": "https://www.suse.com/security/cve/CVE-2016-1654" }, { "category": "external", "summary": "SUSE Bug 975572 for CVE-2016-1654", "url": "https://bugzilla.suse.com/975572" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1654" }, { "cve": "CVE-2016-1655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1655" } ], "notes": [ { "category": "general", "text": "Google Chrome before 50.0.2661.75 does not properly consider that frame removal may occur during callback execution, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1655", "url": "https://www.suse.com/security/cve/CVE-2016-1655" }, { "category": "external", "summary": "SUSE Bug 975572 for CVE-2016-1655", "url": "https://bugzilla.suse.com/975572" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1655" }, { "cve": "CVE-2016-1656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1656" } ], "notes": [ { "category": "general", "text": "The download implementation in Google Chrome before 50.0.2661.75 on Android allows remote attackers to bypass intended pathname restrictions via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1656", "url": "https://www.suse.com/security/cve/CVE-2016-1656" }, { "category": "external", "summary": "SUSE Bug 975572 for CVE-2016-1656", "url": "https://bugzilla.suse.com/975572" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1656" }, { "cve": "CVE-2016-1657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1657" } ], "notes": [ { "category": "general", "text": "The WebContentsImpl::FocusLocationBarByDefault function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 50.0.2661.75 mishandles focus for certain about:blank pages, which allows remote attackers to spoof the address bar via a crafted URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1657", "url": "https://www.suse.com/security/cve/CVE-2016-1657" }, { "category": "external", "summary": "SUSE Bug 975572 for CVE-2016-1657", "url": "https://bugzilla.suse.com/975572" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1657" }, { "cve": "CVE-2016-1658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1658" } ], "notes": [ { "category": "general", "text": "The Extensions subsystem in Google Chrome before 50.0.2661.75 incorrectly relies on GetOrigin method calls for origin comparisons, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1658", "url": "https://www.suse.com/security/cve/CVE-2016-1658" }, { "category": "external", "summary": "SUSE Bug 975572 for CVE-2016-1658", "url": "https://bugzilla.suse.com/975572" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1658" }, { "cve": "CVE-2016-1659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1659" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 50.0.2661.75 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1659", "url": "https://www.suse.com/security/cve/CVE-2016-1659" }, { "category": "external", "summary": "SUSE Bug 975572 for CVE-2016-1659", "url": "https://bugzilla.suse.com/975572" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-1659" }, { "cve": "CVE-2016-1660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1660" } ], "notes": [ { "category": "general", "text": "Blink, as used in Google Chrome before 50.0.2661.94, mishandles assertions in the WTF::BitArray and WTF::double_conversion::Vector classes, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1660", "url": "https://www.suse.com/security/cve/CVE-2016-1660" }, { "category": "external", "summary": "SUSE Bug 977830 for CVE-2016-1660", "url": "https://bugzilla.suse.com/977830" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1660" }, { "cve": "CVE-2016-1661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1661" } ], "notes": [ { "category": "general", "text": "Blink, as used in Google Chrome before 50.0.2661.94, does not ensure that frames satisfy a check for the same renderer process in addition to a Same Origin Policy check, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted web site, related to BindingSecurity.cpp and DOMWindow.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1661", "url": "https://www.suse.com/security/cve/CVE-2016-1661" }, { "category": "external", "summary": "SUSE Bug 977830 for CVE-2016-1661", "url": "https://bugzilla.suse.com/977830" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1661" }, { "cve": "CVE-2016-1662", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1662" } ], "notes": [ { "category": "general", "text": "extensions/renderer/gc_callback.cc in Google Chrome before 50.0.2661.94 does not prevent fallback execution once the Garbage Collection callback has started, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1662", "url": "https://www.suse.com/security/cve/CVE-2016-1662" }, { "category": "external", "summary": "SUSE Bug 977830 for CVE-2016-1662", "url": "https://bugzilla.suse.com/977830" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1662" }, { "cve": "CVE-2016-1663", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1663" } ], "notes": [ { "category": "general", "text": "The SerializedScriptValue::transferArrayBuffers function in WebKit/Source/bindings/core/v8/SerializedScriptValue.cpp in the V8 bindings in Blink, as used in Google Chrome before 50.0.2661.94, mishandles certain array-buffer data structures, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1663", "url": "https://www.suse.com/security/cve/CVE-2016-1663" }, { "category": "external", "summary": "SUSE Bug 977830 for CVE-2016-1663", "url": "https://bugzilla.suse.com/977830" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1663" }, { "cve": "CVE-2016-1664", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1664" } ], "notes": [ { "category": "general", "text": "The HistoryController::UpdateForCommit function in content/renderer/history_controller.cc in Google Chrome before 50.0.2661.94 mishandles the interaction between subframe forward navigations and other forward navigations, which allows remote attackers to spoof the address bar via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1664", "url": "https://www.suse.com/security/cve/CVE-2016-1664" }, { "category": "external", "summary": "SUSE Bug 977830 for CVE-2016-1664", "url": "https://bugzilla.suse.com/977830" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1664" }, { "cve": "CVE-2016-1665", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1665" } ], "notes": [ { "category": "general", "text": "The JSGenericLowering class in compiler/js-generic-lowering.cc in Google V8, as used in Google Chrome before 50.0.2661.94, mishandles comparison operators, which allows remote attackers to obtain sensitive information via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1665", "url": "https://www.suse.com/security/cve/CVE-2016-1665" }, { "category": "external", "summary": "SUSE Bug 977830 for CVE-2016-1665", "url": "https://bugzilla.suse.com/977830" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1665" }, { "cve": "CVE-2016-1666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1666" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 50.0.2661.94 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1666", "url": "https://www.suse.com/security/cve/CVE-2016-1666" }, { "category": "external", "summary": "SUSE Bug 977830 for CVE-2016-1666", "url": "https://bugzilla.suse.com/977830" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1666" }, { "cve": "CVE-2016-1667", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1667" } ], "notes": [ { "category": "general", "text": "The TreeScope::adoptIfNeeded function in WebKit/Source/core/dom/TreeScope.cpp in the DOM implementation in Blink, as used in Google Chrome before 50.0.2661.102, does not prevent script execution during node-adoption operations, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1667", "url": "https://www.suse.com/security/cve/CVE-2016-1667" }, { "category": "external", "summary": "SUSE Bug 979859 for CVE-2016-1667", "url": "https://bugzilla.suse.com/979859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1667" }, { "cve": "CVE-2016-1668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1668" } ], "notes": [ { "category": "general", "text": "The forEachForBinding function in WebKit/Source/bindings/core/v8/Iterable.h in the V8 bindings in Blink, as used in Google Chrome before 50.0.2661.102, uses an improper creation context, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1668", "url": "https://www.suse.com/security/cve/CVE-2016-1668" }, { "category": "external", "summary": "SUSE Bug 979859 for CVE-2016-1668", "url": "https://bugzilla.suse.com/979859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1668" }, { "cve": "CVE-2016-1669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1669" } ], "notes": [ { "category": "general", "text": "The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1669", "url": "https://www.suse.com/security/cve/CVE-2016-1669" }, { "category": "external", "summary": "SUSE Bug 979859 for CVE-2016-1669", "url": "https://bugzilla.suse.com/979859" }, { "category": "external", "summary": "SUSE Bug 987919 for CVE-2016-1669", "url": "https://bugzilla.suse.com/987919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1669" }, { "cve": "CVE-2016-1670", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1670" } ], "notes": [ { "category": "general", "text": "Race condition in the ResourceDispatcherHostImpl::BeginRequest function in content/browser/loader/resource_dispatcher_host_impl.cc in Google Chrome before 50.0.2661.102 allows remote attackers to make arbitrary HTTP requests by leveraging access to a renderer process and reusing a request ID.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1670", "url": "https://www.suse.com/security/cve/CVE-2016-1670" }, { "category": "external", "summary": "SUSE Bug 979859 for CVE-2016-1670", "url": "https://bugzilla.suse.com/979859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1670" }, { "cve": "CVE-2016-1672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1672" } ], "notes": [ { "category": "general", "text": "The ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the extension bindings in Google Chrome before 51.0.2704.63 mishandles properties, which allows remote attackers to conduct bindings-interception attacks and bypass the Same Origin Policy via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1672", "url": "https://www.suse.com/security/cve/CVE-2016-1672" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1672", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1672" }, { "cve": "CVE-2016-1673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1673" } ], "notes": [ { "category": "general", "text": "Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1673", "url": "https://www.suse.com/security/cve/CVE-2016-1673" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1673", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1673" }, { "cve": "CVE-2016-1674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1674" } ], "notes": [ { "category": "general", "text": "The extensions subsystem in Google Chrome before 51.0.2704.63 allows remote attackers to bypass the Same Origin Policy via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1674", "url": "https://www.suse.com/security/cve/CVE-2016-1674" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1674", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1674" }, { "cve": "CVE-2016-1675", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1675" } ], "notes": [ { "category": "general", "text": "Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same Origin Policy by leveraging the mishandling of Document reattachment during destruction, related to FrameLoader.cpp and LocalFrame.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1675", "url": "https://www.suse.com/security/cve/CVE-2016-1675" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1675", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1675" }, { "cve": "CVE-2016-1676", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1676" } ], "notes": [ { "category": "general", "text": "extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before 51.0.2704.63 does not properly use prototypes, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1676", "url": "https://www.suse.com/security/cve/CVE-2016-1676" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1676", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1676" }, { "cve": "CVE-2016-1677", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1677" } ], "notes": [ { "category": "general", "text": "uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging \"type confusion.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1677", "url": "https://www.suse.com/security/cve/CVE-2016-1677" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1677", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1677" }, { "cve": "CVE-2016-1678", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1678" } ], "notes": [ { "category": "general", "text": "objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1678", "url": "https://www.suse.com/security/cve/CVE-2016-1678" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1678", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1678" }, { "cve": "CVE-2016-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1679" } ], "notes": [ { "category": "general", "text": "The ToV8Value function in content/child/v8_value_converter_impl.cc in the V8 bindings in Google Chrome before 51.0.2704.63 does not properly restrict use of getters and setters, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1679", "url": "https://www.suse.com/security/cve/CVE-2016-1679" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1679", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1679" }, { "cve": "CVE-2016-1680", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1680" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in ports/SkFontHost_FreeType.cpp in Skia, as used in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1680", "url": "https://www.suse.com/security/cve/CVE-2016-1680" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1680", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1680" }, { "cve": "CVE-2016-1681", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1681" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the opj_j2k_read_SPCod_SPCoc function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1681", "url": "https://www.suse.com/security/cve/CVE-2016-1681" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1681", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1681" }, { "cve": "CVE-2016-1682", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1682" } ], "notes": [ { "category": "general", "text": "The ServiceWorkerContainer::registerServiceWorkerImpl function in WebKit/Source/modules/serviceworkers/ServiceWorkerContainer.cpp in Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via a ServiceWorker registration.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1682", "url": "https://www.suse.com/security/cve/CVE-2016-1682" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1682", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1682" }, { "cve": "CVE-2016-1683", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1683" } ], "notes": [ { "category": "general", "text": "numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles namespace nodes, which allows remote attackers to cause a denial of service (out-of-bounds heap memory access) or possibly have unspecified other impact via a crafted document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1683", "url": "https://www.suse.com/security/cve/CVE-2016-1683" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1683", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1683" }, { "cve": "CVE-2016-1684", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1684" } ], "notes": [ { "category": "general", "text": "numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles the i format token for xsl:number data, which allows remote attackers to cause a denial of service (integer overflow or resource consumption) or possibly have unspecified other impact via a crafted document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1684", "url": "https://www.suse.com/security/cve/CVE-2016-1684" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1684", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1684" }, { "cve": "CVE-2016-1685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1685" } ], "notes": [ { "category": "general", "text": "core/fxge/ge/fx_ge_text.cpp in PDFium, as used in Google Chrome before 51.0.2704.63, miscalculates certain index values, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1685", "url": "https://www.suse.com/security/cve/CVE-2016-1685" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1685", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1685" }, { "cve": "CVE-2016-1686", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1686" } ], "notes": [ { "category": "general", "text": "The CPDF_DIBSource::CreateDecoder function in core/fpdfapi/fpdf_render/fpdf_render_loadimage.cpp in PDFium, as used in Google Chrome before 51.0.2704.63, mishandles decoder-initialization failure, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1686", "url": "https://www.suse.com/security/cve/CVE-2016-1686" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1686", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1686" }, { "cve": "CVE-2016-1687", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1687" } ], "notes": [ { "category": "general", "text": "The renderer implementation in Google Chrome before 51.0.2704.63 does not properly restrict public exposure of classes, which allows remote attackers to obtain sensitive information via vectors related to extensions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1687", "url": "https://www.suse.com/security/cve/CVE-2016-1687" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1687", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1687" }, { "cve": "CVE-2016-1688", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1688" } ], "notes": [ { "category": "general", "text": "The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1688", "url": "https://www.suse.com/security/cve/CVE-2016-1688" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1688", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1688" }, { "cve": "CVE-2016-1689", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1689" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in content/renderer/media/canvas_capture_handler.cc in Google Chrome before 51.0.2704.63 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1689", "url": "https://www.suse.com/security/cve/CVE-2016-1689" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1689", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1689" }, { "cve": "CVE-2016-1690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1690" } ], "notes": [ { "category": "general", "text": "The Autofill implementation in Google Chrome before 51.0.2704.63 mishandles the interaction between field updates and JavaScript code that triggers a frame deletion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site, a different vulnerability than CVE-2016-1701.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1690", "url": "https://www.suse.com/security/cve/CVE-2016-1690" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1690", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1690" }, { "cve": "CVE-2016-1691", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1691" } ], "notes": [ { "category": "general", "text": "Skia, as used in Google Chrome before 51.0.2704.63, mishandles coincidence runs, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted curves, related to SkOpCoincidence.cpp and SkPathOpsCommon.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1691", "url": "https://www.suse.com/security/cve/CVE-2016-1691" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1691", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1691" }, { "cve": "CVE-2016-1692", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1692" } ], "notes": [ { "category": "general", "text": "WebKit/Source/core/css/StyleSheetContents.cpp in Blink, as used in Google Chrome before 51.0.2704.63, permits cross-origin loading of CSS stylesheets by a ServiceWorker even when the stylesheet download has an incorrect MIME type, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1692", "url": "https://www.suse.com/security/cve/CVE-2016-1692" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1692", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1692" }, { "cve": "CVE-2016-1693", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1693" } ], "notes": [ { "category": "general", "text": "browser/safe_browsing/srt_field_trial_win.cc in Google Chrome before 51.0.2704.63 does not use the HTTPS service on dl.google.com to obtain the Software Removal Tool, which allows remote attackers to spoof the chrome_cleanup_tool.exe (aka CCT) file via a man-in-the-middle attack on an HTTP session.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1693", "url": "https://www.suse.com/security/cve/CVE-2016-1693" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1693", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1693" }, { "cve": "CVE-2016-1694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1694" } ], "notes": [ { "category": "general", "text": "browser/browsing_data/browsing_data_remover.cc in Google Chrome before 51.0.2704.63 deletes HPKP pins during cache clearing, which makes it easier for remote attackers to spoof web sites via a valid certificate from an arbitrary recognized Certification Authority.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1694", "url": "https://www.suse.com/security/cve/CVE-2016-1694" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1694", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1694" }, { "cve": "CVE-2016-1695", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1695" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.63 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1695", "url": "https://www.suse.com/security/cve/CVE-2016-1695" }, { "category": "external", "summary": "SUSE Bug 981886 for CVE-2016-1695", "url": "https://bugzilla.suse.com/981886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1695" }, { "cve": "CVE-2016-1696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1696" } ], "notes": [ { "category": "general", "text": "The extensions subsystem in Google Chrome before 51.0.2704.79 does not properly restrict bindings access, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1696", "url": "https://www.suse.com/security/cve/CVE-2016-1696" }, { "category": "external", "summary": "SUSE Bug 982719 for CVE-2016-1696", "url": "https://bugzilla.suse.com/982719" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1696" }, { "cve": "CVE-2016-1697", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1697" } ], "notes": [ { "category": "general", "text": "The FrameLoader::startLoad function in WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 51.0.2704.79, does not prevent frame navigations during DocumentLoader detach operations, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1697", "url": "https://www.suse.com/security/cve/CVE-2016-1697" }, { "category": "external", "summary": "SUSE Bug 982719 for CVE-2016-1697", "url": "https://bugzilla.suse.com/982719" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1697" }, { "cve": "CVE-2016-1698", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1698" } ], "notes": [ { "category": "general", "text": "The createCustomType function in extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before 51.0.2704.79 does not validate module types, which might allow attackers to load arbitrary modules or obtain sensitive information by leveraging a poisoned definition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1698", "url": "https://www.suse.com/security/cve/CVE-2016-1698" }, { "category": "external", "summary": "SUSE Bug 982719 for CVE-2016-1698", "url": "https://bugzilla.suse.com/982719" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1698" }, { "cve": "CVE-2016-1699", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1699" } ], "notes": [ { "category": "general", "text": "WebKit/Source/devtools/front_end/devtools.js in the Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 51.0.2704.79, does not ensure that the remoteFrontendUrl parameter is associated with a chrome-devtools-frontend.appspot.com URL, which allows remote attackers to bypass intended access restrictions via a crafted URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1699", "url": "https://www.suse.com/security/cve/CVE-2016-1699" }, { "category": "external", "summary": "SUSE Bug 982719 for CVE-2016-1699", "url": "https://bugzilla.suse.com/982719" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1699" }, { "cve": "CVE-2016-1700", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1700" } ], "notes": [ { "category": "general", "text": "extensions/renderer/runtime_custom_bindings.cc in Google Chrome before 51.0.2704.79 does not consider side effects during creation of an array of extension views, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to extensions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1700", "url": "https://www.suse.com/security/cve/CVE-2016-1700" }, { "category": "external", "summary": "SUSE Bug 982719 for CVE-2016-1700", "url": "https://bugzilla.suse.com/982719" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1700" }, { "cve": "CVE-2016-1701", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1701" } ], "notes": [ { "category": "general", "text": "The Autofill implementation in Google Chrome before 51.0.2704.79 mishandles the interaction between field updates and JavaScript code that triggers a frame deletion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site, a different vulnerability than CVE-2016-1690.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1701", "url": "https://www.suse.com/security/cve/CVE-2016-1701" }, { "category": "external", "summary": "SUSE Bug 982719 for CVE-2016-1701", "url": "https://bugzilla.suse.com/982719" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1701" }, { "cve": "CVE-2016-1702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1702" } ], "notes": [ { "category": "general", "text": "The SkRegion::readFromMemory function in core/SkRegion.cpp in Skia, as used in Google Chrome before 51.0.2704.79, does not validate the interval count, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted serialized data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1702", "url": "https://www.suse.com/security/cve/CVE-2016-1702" }, { "category": "external", "summary": "SUSE Bug 982719 for CVE-2016-1702", "url": "https://bugzilla.suse.com/982719" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1702" }, { "cve": "CVE-2016-1703", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1703" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.79 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1703", "url": "https://www.suse.com/security/cve/CVE-2016-1703" }, { "category": "external", "summary": "SUSE Bug 982719 for CVE-2016-1703", "url": "https://bugzilla.suse.com/982719" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1703" }, { "cve": "CVE-2016-1704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1704" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.103 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1704", "url": "https://www.suse.com/security/cve/CVE-2016-1704" }, { "category": "external", "summary": "SUSE Bug 985397 for CVE-2016-1704", "url": "https://bugzilla.suse.com/985397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1704" }, { "cve": "CVE-2016-1705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1705" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 52.0.2743.82 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1705", "url": "https://www.suse.com/security/cve/CVE-2016-1705" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-1705", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1705" }, { "cve": "CVE-2016-1706", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1706" } ], "notes": [ { "category": "general", "text": "The PPAPI implementation in Google Chrome before 52.0.2743.82 does not validate the origin of IPC messages to the plugin broker process that should have come from the browser process, which allows remote attackers to bypass a sandbox protection mechanism via an unexpected message type, related to broker_process_dispatcher.cc, ppapi_plugin_process_host.cc, ppapi_thread.cc, and render_frame_message_filter.cc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1706", "url": "https://www.suse.com/security/cve/CVE-2016-1706" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-1706", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1706" }, { "cve": "CVE-2016-1707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1707" } ], "notes": [ { "category": "general", "text": "ios/web/web_state/ui/crw_web_controller.mm in Google Chrome before 52.0.2743.82 on iOS does not ensure that an invalid URL is replaced with the about:blank URL, which allows remote attackers to spoof the URL display via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1707", "url": "https://www.suse.com/security/cve/CVE-2016-1707" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-1707", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1707" }, { "cve": "CVE-2016-1708", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1708" } ], "notes": [ { "category": "general", "text": "The Chrome Web Store inline-installation implementation in the Extensions subsystem in Google Chrome before 52.0.2743.82 does not properly consider object lifetimes during progress observation, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1708", "url": "https://www.suse.com/security/cve/CVE-2016-1708" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-1708", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1708" }, { "cve": "CVE-2016-1709", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1709" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the ByteArray::Get method in data/byte_array.cc in Google sfntly before 2016-06-10, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted SFNT font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1709", "url": "https://www.suse.com/security/cve/CVE-2016-1709" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-1709", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1709" }, { "cve": "CVE-2016-1710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1710" } ], "notes": [ { "category": "general", "text": "The ChromeClientImpl::createWindow method in WebKit/Source/web/ChromeClientImpl.cpp in Blink, as used in Google Chrome before 52.0.2743.82, does not prevent window creation by a deferred frame, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1710", "url": "https://www.suse.com/security/cve/CVE-2016-1710" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-1710", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1710" }, { "cve": "CVE-2016-1711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1711" } ], "notes": [ { "category": "general", "text": "WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 52.0.2743.82, does not disable frame navigation during a detach operation on a DocumentLoader object, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1711", "url": "https://www.suse.com/security/cve/CVE-2016-1711" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-1711", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1711" }, { "cve": "CVE-2016-3679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3679" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3679", "url": "https://www.suse.com/security/cve/CVE-2016-3679" }, { "category": "external", "summary": "SUSE Bug 972834 for CVE-2016-3679", "url": "https://bugzilla.suse.com/972834" }, { "category": "external", "summary": "SUSE Bug 973166 for CVE-2016-3679", "url": "https://bugzilla.suse.com/973166" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-3679" }, { "cve": "CVE-2016-5127", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5127" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in WebKit/Source/core/editing/VisibleUnits.cpp in Blink, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code involving an @import at-rule in a Cascading Style Sheets (CSS) token sequence in conjunction with a rel=import attribute of a LINK element.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5127", "url": "https://www.suse.com/security/cve/CVE-2016-5127" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-5127", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5127" }, { "cve": "CVE-2016-5128", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5128" } ], "notes": [ { "category": "general", "text": "objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5128", "url": "https://www.suse.com/security/cve/CVE-2016-5128" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-5128", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5128" }, { "cve": "CVE-2016-5129", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5129" } ], "notes": [ { "category": "general", "text": "Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5129", "url": "https://www.suse.com/security/cve/CVE-2016-5129" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-5129", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5129" }, { "cve": "CVE-2016-5130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5130" } ], "notes": [ { "category": "general", "text": "content/renderer/history_controller.cc in Google Chrome before 52.0.2743.82 does not properly restrict multiple uses of a JavaScript forward method, which allows remote attackers to spoof the URL display via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5130", "url": "https://www.suse.com/security/cve/CVE-2016-5130" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-5130", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5130" }, { "cve": "CVE-2016-5131", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5131" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5131", "url": "https://www.suse.com/security/cve/CVE-2016-5131" }, { "category": "external", "summary": "SUSE Bug 1014873 for CVE-2016-5131", "url": "https://bugzilla.suse.com/1014873" }, { "category": "external", "summary": "SUSE Bug 1069433 for CVE-2016-5131", "url": "https://bugzilla.suse.com/1069433" }, { "category": "external", "summary": "SUSE Bug 1078813 for CVE-2016-5131", "url": "https://bugzilla.suse.com/1078813" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-5131", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-5131", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5131" }, { "cve": "CVE-2016-5132", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5132" } ], "notes": [ { "category": "general", "text": "The Service Workers subsystem in Google Chrome before 52.0.2743.82 does not properly implement the Secure Contexts specification during decisions about whether to control a subframe, which allows remote attackers to bypass the Same Origin Policy via an https IFRAME element inside an http IFRAME element.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5132", "url": "https://www.suse.com/security/cve/CVE-2016-5132" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-5132", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5132" }, { "cve": "CVE-2016-5133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5133" } ], "notes": [ { "category": "general", "text": "Google Chrome before 52.0.2743.82 mishandles origin information during proxy authentication, which allows man-in-the-middle attackers to spoof a proxy-authentication login prompt or trigger incorrect credential storage by modifying the client-server data stream.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5133", "url": "https://www.suse.com/security/cve/CVE-2016-5133" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-5133", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5133" }, { "cve": "CVE-2016-5134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5134" } ], "notes": [ { "category": "general", "text": "net/proxy/proxy_service.cc in the Proxy Auto-Config (PAC) feature in Google Chrome before 52.0.2743.82 does not ensure that URL information is restricted to a scheme, host, and port, which allows remote attackers to discover credentials by operating a server with a PAC script, a related issue to CVE-2016-3763.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5134", "url": "https://www.suse.com/security/cve/CVE-2016-5134" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-5134", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5134" }, { "cve": "CVE-2016-5135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5135" } ], "notes": [ { "category": "general", "text": "WebKit/Source/core/html/parser/HTMLPreloadScanner.cpp in Blink, as used in Google Chrome before 52.0.2743.82, does not consider referrer-policy information inside an HTML document during a preload request, which allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via a crafted web site, as demonstrated by a \"Content-Security-Policy: referrer origin-when-cross-origin\" header that overrides a \"\u003cMETA name=\u0027referrer\u0027 content=\u0027no-referrer\u0027\u003e\" element.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5135", "url": "https://www.suse.com/security/cve/CVE-2016-5135" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-5135", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5135" }, { "cve": "CVE-2016-5136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5136" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in extensions/renderer/user_script_injector.cc in the Extensions subsystem in Google Chrome before 52.0.2743.82 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to script deletion.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5136", "url": "https://www.suse.com/security/cve/CVE-2016-5136" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-5136", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5136" }, { "cve": "CVE-2016-5137", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5137" } ], "notes": [ { "category": "general", "text": "The CSPSource::schemeMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 52.0.2743.82, does not apply http :80 policies to https :443 URLs and does not apply ws :80 policies to wss :443 URLs, which makes it easier for remote attackers to determine whether a specific HSTS web site has been visited by reading a CSP report. NOTE: this vulnerability is associated with a specification change after CVE-2016-1617 resolution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5137", "url": "https://www.suse.com/security/cve/CVE-2016-5137" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-5137", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5137" }, { "cve": "CVE-2016-5139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5139" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 52.0.2743.116, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5139", "url": "https://www.suse.com/security/cve/CVE-2016-5139" }, { "category": "external", "summary": "SUSE Bug 992305 for CVE-2016-5139", "url": "https://bugzilla.suse.com/992305" }, { "category": "external", "summary": "SUSE Bug 992311 for CVE-2016-5139", "url": "https://bugzilla.suse.com/992311" }, { "category": "external", "summary": "SUSE Bug 992325 for CVE-2016-5139", "url": "https://bugzilla.suse.com/992325" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5139" }, { "cve": "CVE-2016-5140", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5140" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the opj_j2k_read_SQcd_SQcc function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 52.0.2743.116, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JPEG 2000 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5140", "url": "https://www.suse.com/security/cve/CVE-2016-5140" }, { "category": "external", "summary": "SUSE Bug 992305 for CVE-2016-5140", "url": "https://bugzilla.suse.com/992305" }, { "category": "external", "summary": "SUSE Bug 992310 for CVE-2016-5140", "url": "https://bugzilla.suse.com/992310" }, { "category": "external", "summary": "SUSE Bug 992325 for CVE-2016-5140", "url": "https://bugzilla.suse.com/992325" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5140" }, { "cve": "CVE-2016-5141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5141" } ], "notes": [ { "category": "general", "text": "Blink, as used in Google Chrome before 52.0.2743.116, allows remote attackers to spoof the address bar via vectors involving a provisional URL for an initially empty document, related to FrameLoader.cpp and ScopedPageLoadDeferrer.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5141", "url": "https://www.suse.com/security/cve/CVE-2016-5141" }, { "category": "external", "summary": "SUSE Bug 992305 for CVE-2016-5141", "url": "https://bugzilla.suse.com/992305" }, { "category": "external", "summary": "SUSE Bug 992314 for CVE-2016-5141", "url": "https://bugzilla.suse.com/992314" }, { "category": "external", "summary": "SUSE Bug 992325 for CVE-2016-5141", "url": "https://bugzilla.suse.com/992325" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5141" }, { "cve": "CVE-2016-5142", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5142" } ], "notes": [ { "category": "general", "text": "The Web Cryptography API (aka WebCrypto) implementation in Blink, as used in Google Chrome before 52.0.2743.116, does not properly copy data buffers, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code, related to NormalizeAlgorithm.cpp and SubtleCrypto.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5142", "url": "https://www.suse.com/security/cve/CVE-2016-5142" }, { "category": "external", "summary": "SUSE Bug 992305 for CVE-2016-5142", "url": "https://bugzilla.suse.com/992305" }, { "category": "external", "summary": "SUSE Bug 992313 for CVE-2016-5142", "url": "https://bugzilla.suse.com/992313" }, { "category": "external", "summary": "SUSE Bug 992325 for CVE-2016-5142", "url": "https://bugzilla.suse.com/992325" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5142" }, { "cve": "CVE-2016-5143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5143" } ], "notes": [ { "category": "general", "text": "The Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 52.0.2743.116, mishandles the script-path hostname, remoteBase parameter, and remoteFrontendUrl parameter, which allows remote attackers to bypass intended access restrictions via a crafted URL, a different vulnerability than CVE-2016-5144.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5143", "url": "https://www.suse.com/security/cve/CVE-2016-5143" }, { "category": "external", "summary": "SUSE Bug 992305 for CVE-2016-5143", "url": "https://bugzilla.suse.com/992305" }, { "category": "external", "summary": "SUSE Bug 992319 for CVE-2016-5143", "url": "https://bugzilla.suse.com/992319" }, { "category": "external", "summary": "SUSE Bug 992325 for CVE-2016-5143", "url": "https://bugzilla.suse.com/992325" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5143" }, { "cve": "CVE-2016-5144", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5144" } ], "notes": [ { "category": "general", "text": "The Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 52.0.2743.116, mishandles the script-path hostname, remoteBase parameter, and remoteFrontendUrl parameter, which allows remote attackers to bypass intended access restrictions via a crafted URL, a different vulnerability than CVE-2016-5143.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5144", "url": "https://www.suse.com/security/cve/CVE-2016-5144" }, { "category": "external", "summary": "SUSE Bug 992305 for CVE-2016-5144", "url": "https://bugzilla.suse.com/992305" }, { "category": "external", "summary": "SUSE Bug 992315 for CVE-2016-5144", "url": "https://bugzilla.suse.com/992315" }, { "category": "external", "summary": "SUSE Bug 992325 for CVE-2016-5144", "url": "https://bugzilla.suse.com/992325" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5144" }, { "cve": "CVE-2016-5145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5145" } ], "notes": [ { "category": "general", "text": "Blink, as used in Google Chrome before 52.0.2743.116, does not ensure that a taint property is preserved after a structure-clone operation on an ImageBitmap object derived from a cross-origin image, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5145", "url": "https://www.suse.com/security/cve/CVE-2016-5145" }, { "category": "external", "summary": "SUSE Bug 992305 for CVE-2016-5145", "url": "https://bugzilla.suse.com/992305" }, { "category": "external", "summary": "SUSE Bug 992320 for CVE-2016-5145", "url": "https://bugzilla.suse.com/992320" }, { "category": "external", "summary": "SUSE Bug 992325 for CVE-2016-5145", "url": "https://bugzilla.suse.com/992325" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5145" }, { "cve": "CVE-2016-5146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5146" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 52.0.2743.116 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5146", "url": "https://www.suse.com/security/cve/CVE-2016-5146" }, { "category": "external", "summary": "SUSE Bug 992305 for CVE-2016-5146", "url": "https://bugzilla.suse.com/992305" }, { "category": "external", "summary": "SUSE Bug 992309 for CVE-2016-5146", "url": "https://bugzilla.suse.com/992309" }, { "category": "external", "summary": "SUSE Bug 992325 for CVE-2016-5146", "url": "https://bugzilla.suse.com/992325" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5146" }, { "cve": "CVE-2016-5147", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5147" } ], "notes": [ { "category": "general", "text": "Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, mishandles deferred page loads, which allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka \"Universal XSS (UXSS).\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5147", "url": "https://www.suse.com/security/cve/CVE-2016-5147" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5147", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5147" }, { "cve": "CVE-2016-5148", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5148" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to inject arbitrary web script or HTML via vectors related to widget updates, aka \"Universal XSS (UXSS).\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5148", "url": "https://www.suse.com/security/cve/CVE-2016-5148" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5148", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5148" }, { "cve": "CVE-2016-5149", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5149" } ], "notes": [ { "category": "general", "text": "The extensions subsystem in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux relies on an IFRAME source URL to identify an associated extension, which allows remote attackers to conduct extension-bindings injection attacks by leveraging script access to a resource that initially has the about:blank URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5149", "url": "https://www.suse.com/security/cve/CVE-2016-5149" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5149", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5149" }, { "cve": "CVE-2016-5150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5150" } ], "notes": [ { "category": "general", "text": "WebKit/Source/bindings/modules/v8/V8BindingForModules.cpp in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, has an Indexed Database (aka IndexedDB) API implementation that does not properly restrict key-path evaluation, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code that leverages certain side effects.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5150", "url": "https://www.suse.com/security/cve/CVE-2016-5150" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5150", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5150" }, { "cve": "CVE-2016-5151", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5151" } ], "notes": [ { "category": "general", "text": "PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux mishandles timers, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted PDF document, related to fpdfsdk/javascript/JS_Object.cpp and fpdfsdk/javascript/app.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5151", "url": "https://www.suse.com/security/cve/CVE-2016-5151" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5151", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5151" }, { "cve": "CVE-2016-5152", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5152" } ], "notes": [ { "category": "general", "text": "Integer overflow in the opj_tcd_get_decoded_tile_size function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5152", "url": "https://www.suse.com/security/cve/CVE-2016-5152" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5152", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5152" }, { "cve": "CVE-2016-5153", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5153" } ], "notes": [ { "category": "general", "text": "The Web Animations implementation in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, improperly relies on list iteration, which allows remote attackers to cause a denial of service (use-after-destruction) or possibly have unspecified other impact via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5153", "url": "https://www.suse.com/security/cve/CVE-2016-5153" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5153", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5153" }, { "cve": "CVE-2016-5154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5154" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in PDFium, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JBig2 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5154", "url": "https://www.suse.com/security/cve/CVE-2016-5154" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5154", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5154" }, { "cve": "CVE-2016-5155", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5155" } ], "notes": [ { "category": "general", "text": "Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly validate access to the initial document, which allows remote attackers to spoof the address bar via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5155", "url": "https://www.suse.com/security/cve/CVE-2016-5155" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5155", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5155" }, { "cve": "CVE-2016-5156", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5156" } ], "notes": [ { "category": "general", "text": "extensions/renderer/event_bindings.cc in the event bindings in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux attempts to process filtered events after failure to add an event matcher, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5156", "url": "https://www.suse.com/security/cve/CVE-2016-5156" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5156", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5156" }, { "cve": "CVE-2016-5157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5157" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the opj_dwt_interleave_v function in dwt.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to execute arbitrary code via crafted coordinate values in JPEG 2000 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5157", "url": "https://www.suse.com/security/cve/CVE-2016-5157" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5157", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5157" }, { "cve": "CVE-2016-5158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5158" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5158", "url": "https://www.suse.com/security/cve/CVE-2016-5158" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5158", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5158" }, { "cve": "CVE-2016-5159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5159" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during opj_aligned_malloc calls in dwt.c and t1.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5159", "url": "https://www.suse.com/security/cve/CVE-2016-5159" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5159", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5159" }, { "cve": "CVE-2016-5160", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5160" } ], "notes": [ { "category": "general", "text": "The AllowCrossRendererResourceLoad function in extensions/browser/url_request_util.cc in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly use an extension\u0027s manifest.json web_accessible_resources field for restrictions on IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks, and trick users into changing extension settings, via a crafted web site, a different vulnerability than CVE-2016-5162.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5160", "url": "https://www.suse.com/security/cve/CVE-2016-5160" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5160", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5160" }, { "cve": "CVE-2016-5161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5161" } ], "notes": [ { "category": "general", "text": "The EditingStyle::mergeStyle function in WebKit/Source/core/editing/EditingStyle.cpp in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, mishandles custom properties, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that leverages \"type confusion\" in the StylePropertySerializer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5161", "url": "https://www.suse.com/security/cve/CVE-2016-5161" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5161", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5161" }, { "cve": "CVE-2016-5162", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5162" } ], "notes": [ { "category": "general", "text": "The AllowCrossRendererResourceLoad function in extensions/browser/url_request_util.cc in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly use an extension\u0027s manifest.json web_accessible_resources field for restrictions on IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks, and trick users into changing extension settings, via a crafted web site, a different vulnerability than CVE-2016-5160.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5162", "url": "https://www.suse.com/security/cve/CVE-2016-5162" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5162", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5162" }, { "cve": "CVE-2016-5163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5163" } ], "notes": [ { "category": "general", "text": "The bidirectional-text implementation in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not ensure left-to-right (LTR) rendering of URLs, which allows remote attackers to spoof the address bar via crafted right-to-left (RTL) Unicode text, related to omnibox/SuggestionView.java and omnibox/UrlBar.java in Chrome for Android.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5163", "url": "https://www.suse.com/security/cve/CVE-2016-5163" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5163", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5163" }, { "cve": "CVE-2016-5164", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5164" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in WebKit/Source/platform/v8_inspector/V8Debugger.cpp in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to inject arbitrary web script or HTML into the Developer Tools (aka DevTools) subsystem via a crafted web site, aka \"Universal XSS (UXSS).\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5164", "url": "https://www.suse.com/security/cve/CVE-2016-5164" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5164", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5164" }, { "cve": "CVE-2016-5165", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5165" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the Developer Tools (aka DevTools) subsystem in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux allows remote attackers to inject arbitrary web script or HTML via the settings parameter in a chrome-devtools-frontend.appspot.com URL\u0027s query string.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5165", "url": "https://www.suse.com/security/cve/CVE-2016-5165" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5165", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5165" }, { "cve": "CVE-2016-5166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5166" } ], "notes": [ { "category": "general", "text": "The download implementation in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly restrict saving a file:// URL that is referenced by an http:// URL, which makes it easier for user-assisted remote attackers to discover NetNTLM hashes and conduct SMB relay attacks via a crafted web page that is accessed with the \"Save page as\" menu choice.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5166", "url": "https://www.suse.com/security/cve/CVE-2016-5166" }, { "category": "external", "summary": "SUSE Bug 996648 for CVE-2016-5166", "url": "https://bugzilla.suse.com/996648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5166" }, { "cve": "CVE-2016-5170", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5170" } ], "notes": [ { "category": "general", "text": "WebKit/Source/bindings/modules/v8/V8BindingForModules.cpp in Blink, as used in Google Chrome before 53.0.2785.113, does not properly consider getter side effects during array key conversion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted Indexed Database (aka IndexedDB) API calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5170", "url": "https://www.suse.com/security/cve/CVE-2016-5170" }, { "category": "external", "summary": "SUSE Bug 998743 for CVE-2016-5170", "url": "https://bugzilla.suse.com/998743" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5170" }, { "cve": "CVE-2016-5171", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5171" } ], "notes": [ { "category": "general", "text": "WebKit/Source/bindings/templates/interface.cpp in Blink, as used in Google Chrome before 53.0.2785.113, does not prevent certain constructor calls, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5171", "url": "https://www.suse.com/security/cve/CVE-2016-5171" }, { "category": "external", "summary": "SUSE Bug 998743 for CVE-2016-5171", "url": "https://bugzilla.suse.com/998743" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5171" }, { "cve": "CVE-2016-5172", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5172" } ], "notes": [ { "category": "general", "text": "The parser in Google V8, as used in Google Chrome before 53.0.2785.113, mishandles scopes, which allows remote attackers to obtain sensitive information from arbitrary memory locations via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5172", "url": "https://www.suse.com/security/cve/CVE-2016-5172" }, { "category": "external", "summary": "SUSE Bug 998743 for CVE-2016-5172", "url": "https://bugzilla.suse.com/998743" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5172" }, { "cve": "CVE-2016-5173", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5173" } ], "notes": [ { "category": "general", "text": "The extensions subsystem in Google Chrome before 53.0.2785.113 does not properly restrict access to Object.prototype, which allows remote attackers to load unintended resources, and consequently trigger unintended JavaScript function calls and bypass the Same Origin Policy via an indirect interception attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5173", "url": "https://www.suse.com/security/cve/CVE-2016-5173" }, { "category": "external", "summary": "SUSE Bug 998743 for CVE-2016-5173", "url": "https://bugzilla.suse.com/998743" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5173" }, { "cve": "CVE-2016-5174", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5174" } ], "notes": [ { "category": "general", "text": "browser/ui/cocoa/browser_window_controller_private.mm in Google Chrome before 53.0.2785.113 does not process fullscreen toggle requests during a fullscreen transition, which allows remote attackers to cause a denial of service (unsuppressed popup) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5174", "url": "https://www.suse.com/security/cve/CVE-2016-5174" }, { "category": "external", "summary": "SUSE Bug 998743 for CVE-2016-5174", "url": "https://bugzilla.suse.com/998743" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5174" }, { "cve": "CVE-2016-5175", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5175" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 53.0.2785.113 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5175", "url": "https://www.suse.com/security/cve/CVE-2016-5175" }, { "category": "external", "summary": "SUSE Bug 998743 for CVE-2016-5175", "url": "https://bugzilla.suse.com/998743" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5175" }, { "cve": "CVE-2016-5177", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5177" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in V8 in Google Chrome before 53.0.2785.143 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5177", "url": "https://www.suse.com/security/cve/CVE-2016-5177" }, { "category": "external", "summary": "SUSE Bug 1002140 for CVE-2016-5177", "url": "https://bugzilla.suse.com/1002140" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5177" }, { "cve": "CVE-2016-5178", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5178" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google Chrome before 53.0.2785.143 allow remote attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5178", "url": "https://www.suse.com/security/cve/CVE-2016-5178" }, { "category": "external", "summary": "SUSE Bug 1002140 for CVE-2016-5178", "url": "https://bugzilla.suse.com/1002140" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5178" }, { "cve": "CVE-2016-5181", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5181" } ], "notes": [ { "category": "general", "text": "Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android permitted execution of v8 microtasks while the DOM was in an inconsistent state, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via crafted HTML pages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5181", "url": "https://www.suse.com/security/cve/CVE-2016-5181" }, { "category": "external", "summary": "SUSE Bug 1004465 for CVE-2016-5181", "url": "https://bugzilla.suse.com/1004465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5181" }, { "cve": "CVE-2016-5182", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5182" } ], "notes": [ { "category": "general", "text": "Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation in bitmap handling, which allowed a remote attacker to potentially exploit heap corruption via crafted HTML pages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5182", "url": "https://www.suse.com/security/cve/CVE-2016-5182" }, { "category": "external", "summary": "SUSE Bug 1004465 for CVE-2016-5182", "url": "https://bugzilla.suse.com/1004465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5182" }, { "cve": "CVE-2016-5183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5183" } ], "notes": [ { "category": "general", "text": "A heap use after free in PDFium in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android allows a remote attacker to potentially exploit heap corruption via crafted PDF files.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5183", "url": "https://www.suse.com/security/cve/CVE-2016-5183" }, { "category": "external", "summary": "SUSE Bug 1004465 for CVE-2016-5183", "url": "https://bugzilla.suse.com/1004465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5183" }, { "cve": "CVE-2016-5184", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5184" } ], "notes": [ { "category": "general", "text": "PDFium in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly handled object lifecycles in CFFL_FormFillter::KillFocusForAnnot, which allowed a remote attacker to potentially exploit heap corruption via crafted PDF files.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5184", "url": "https://www.suse.com/security/cve/CVE-2016-5184" }, { "category": "external", "summary": "SUSE Bug 1004465 for CVE-2016-5184", "url": "https://bugzilla.suse.com/1004465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5184" }, { "cve": "CVE-2016-5185", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5185" } ], "notes": [ { "category": "general", "text": "Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly allowed reentrance of FrameView::updateLifecyclePhasesInternal(), which allowed a remote attacker to perform an out of bounds memory read via crafted HTML pages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5185", "url": "https://www.suse.com/security/cve/CVE-2016-5185" }, { "category": "external", "summary": "SUSE Bug 1004465 for CVE-2016-5185", "url": "https://bugzilla.suse.com/1004465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5185" }, { "cve": "CVE-2016-5186", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5186" } ], "notes": [ { "category": "general", "text": "Devtools in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly handled objects after a tab crash, which allowed a remote attacker to perform an out of bounds memory read via crafted PDF files.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5186", "url": "https://www.suse.com/security/cve/CVE-2016-5186" }, { "category": "external", "summary": "SUSE Bug 1004465 for CVE-2016-5186", "url": "https://bugzilla.suse.com/1004465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5186" }, { "cve": "CVE-2016-5187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5187" } ], "notes": [ { "category": "general", "text": "Google Chrome prior to 54.0.2840.85 for Android incorrectly handled rapid transition into and out of full screen mode, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via crafted HTML pages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5187", "url": "https://www.suse.com/security/cve/CVE-2016-5187" }, { "category": "external", "summary": "SUSE Bug 1004465 for CVE-2016-5187", "url": "https://bugzilla.suse.com/1004465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5187" }, { "cve": "CVE-2016-5188", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5188" } ], "notes": [ { "category": "general", "text": "Multiple issues in Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux allow a remote attacker to spoof various parts of browser UI via crafted HTML pages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5188", "url": "https://www.suse.com/security/cve/CVE-2016-5188" }, { "category": "external", "summary": "SUSE Bug 1004465 for CVE-2016-5188", "url": "https://bugzilla.suse.com/1004465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5188" }, { "cve": "CVE-2016-5189", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5189" } ], "notes": [ { "category": "general", "text": "Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android permitted navigation to blob URLs with non-canonical origins, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via crafted HTML pages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5189", "url": "https://www.suse.com/security/cve/CVE-2016-5189" }, { "category": "external", "summary": "SUSE Bug 1004465 for CVE-2016-5189", "url": "https://bugzilla.suse.com/1004465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5189" }, { "cve": "CVE-2016-5190", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5190" } ], "notes": [ { "category": "general", "text": "Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly handled object lifecycles during shutdown, which allowed a remote attacker to perform an out of bounds memory read via crafted HTML pages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5190", "url": "https://www.suse.com/security/cve/CVE-2016-5190" }, { "category": "external", "summary": "SUSE Bug 1004465 for CVE-2016-5190", "url": "https://bugzilla.suse.com/1004465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5190" }, { "cve": "CVE-2016-5191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5191" } ], "notes": [ { "category": "general", "text": "Bookmark handling in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation of supplied data, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via crafted HTML pages, as demonstrated by an interpretation conflict between userinfo and scheme in an http://javascript:payload@example.com URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5191", "url": "https://www.suse.com/security/cve/CVE-2016-5191" }, { "category": "external", "summary": "SUSE Bug 1004465 for CVE-2016-5191", "url": "https://bugzilla.suse.com/1004465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5191" }, { "cve": "CVE-2016-5192", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5192" } ], "notes": [ { "category": "general", "text": "Blink in Google Chrome prior to 54.0.2840.59 for Windows missed a CORS check on redirect in TextTrackLoader, which allowed a remote attacker to bypass cross-origin restrictions via crafted HTML pages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5192", "url": "https://www.suse.com/security/cve/CVE-2016-5192" }, { "category": "external", "summary": "SUSE Bug 1004465 for CVE-2016-5192", "url": "https://bugzilla.suse.com/1004465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5192" }, { "cve": "CVE-2016-5193", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5193" } ], "notes": [ { "category": "general", "text": "Google Chrome prior to 54.0 for iOS had insufficient validation of URLs for windows open by DOM, which allowed a remote attacker to bypass restrictions on navigation to certain URL schemes via crafted HTML pages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5193", "url": "https://www.suse.com/security/cve/CVE-2016-5193" }, { "category": "external", "summary": "SUSE Bug 1004465 for CVE-2016-5193", "url": "https://bugzilla.suse.com/1004465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-5193" }, { "cve": "CVE-2016-5198", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5198" } ], "notes": [ { "category": "general", "text": "V8 in Google Chrome prior to 54.0.2840.90 for Linux, and 54.0.2840.85 for Android, and 54.0.2840.87 for Windows and Mac included incorrect optimisation assumptions, which allowed a remote attacker to perform arbitrary read/write operations, leading to code execution, via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5198", "url": "https://www.suse.com/security/cve/CVE-2016-5198" }, { "category": "external", "summary": "SUSE Bug 1008274 for CVE-2016-5198", "url": "https://bugzilla.suse.com/1008274" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5198" }, { "cve": "CVE-2016-5199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5199" } ], "notes": [ { "category": "general", "text": "An off by one error resulting in an allocation of zero size in FFmpeg in Google Chrome prior to 54.0.2840.98 for Mac, and 54.0.2840.99 for Windows, and 54.0.2840.100 for Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted video file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5199", "url": "https://www.suse.com/security/cve/CVE-2016-5199" }, { "category": "external", "summary": "SUSE Bug 1009892 for CVE-2016-5199", "url": "https://bugzilla.suse.com/1009892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5199" }, { "cve": "CVE-2016-5200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5200" } ], "notes": [ { "category": "general", "text": "V8 in Google Chrome prior to 54.0.2840.98 for Mac, and 54.0.2840.99 for Windows, and 54.0.2840.100 for Linux, and 55.0.2883.84 for Android incorrectly applied type rules, which allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5200", "url": "https://www.suse.com/security/cve/CVE-2016-5200" }, { "category": "external", "summary": "SUSE Bug 1009893 for CVE-2016-5200", "url": "https://bugzilla.suse.com/1009893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5200" }, { "cve": "CVE-2016-5201", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5201" } ], "notes": [ { "category": "general", "text": "A leak of privateClass in the extensions API in Google Chrome prior to 54.0.2840.100 for Linux, and 54.0.2840.99 for Windows, and 54.0.2840.98 for Mac allowed a remote attacker to access privileged JavaScript code via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5201", "url": "https://www.suse.com/security/cve/CVE-2016-5201" }, { "category": "external", "summary": "SUSE Bug 1009894 for CVE-2016-5201", "url": "https://bugzilla.suse.com/1009894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5201" }, { "cve": "CVE-2016-5202", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5202" } ], "notes": [ { "category": "general", "text": "browser/extensions/api/dial/dial_registry.cc in Google Chrome before 54.0.2840.98 on macOS, before 54.0.2840.99 on Windows, and before 54.0.2840.100 on Linux neglects to copy a device ID before an erase() call, which causes the erase operation to access data that that erase operation will destroy.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5202", "url": "https://www.suse.com/security/cve/CVE-2016-5202" }, { "category": "external", "summary": "SUSE Bug 1009895 for CVE-2016-5202", "url": "https://bugzilla.suse.com/1009895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5202" }, { "cve": "CVE-2016-5204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5204" } ], "notes": [ { "category": "general", "text": "Leaking of an SVG shadow tree leading to corruption of the DOM tree in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5204", "url": "https://www.suse.com/security/cve/CVE-2016-5204" }, { "category": "external", "summary": "SUSE Bug 1013236 for CVE-2016-5204", "url": "https://bugzilla.suse.com/1013236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5204" }, { "cve": "CVE-2016-5211", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5211" } ], "notes": [ { "category": "general", "text": "A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5211", "url": "https://www.suse.com/security/cve/CVE-2016-5211" }, { "category": "external", "summary": "SUSE Bug 1013236 for CVE-2016-5211", "url": "https://bugzilla.suse.com/1013236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5211" }, { "cve": "CVE-2016-5217", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5217" } ], "notes": [ { "category": "general", "text": "The extensions API in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly permitted access to privileged plugins, which allowed a remote attacker to bypass site isolation via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5217", "url": "https://www.suse.com/security/cve/CVE-2016-5217" }, { "category": "external", "summary": "SUSE Bug 1013236 for CVE-2016-5217", "url": "https://bugzilla.suse.com/1013236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5217" }, { "cve": "CVE-2016-5222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5222" } ], "notes": [ { "category": "general", "text": "Incorrect handling of invalid URLs in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5222", "url": "https://www.suse.com/security/cve/CVE-2016-5222" }, { "category": "external", "summary": "SUSE Bug 1013236 for CVE-2016-5222", "url": "https://bugzilla.suse.com/1013236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5222" }, { "cve": "CVE-2016-5224", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5224" } ], "notes": [ { "category": "general", "text": "A timing attack on denormalized floating point arithmetic in SVG filters in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5224", "url": "https://www.suse.com/security/cve/CVE-2016-5224" }, { "category": "external", "summary": "SUSE Bug 1013236 for CVE-2016-5224", "url": "https://bugzilla.suse.com/1013236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5224" }, { "cve": "CVE-2016-9651", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9651" } ], "notes": [ { "category": "general", "text": "A missing check for whether a property of a JS object is private in V8 in Google Chrome prior to 55.0.2883.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9651", "url": "https://www.suse.com/security/cve/CVE-2016-9651" }, { "category": "external", "summary": "SUSE Bug 1013236 for CVE-2016-9651", "url": "https://bugzilla.suse.com/1013236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-9651" }, { "cve": "CVE-2017-11215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11215" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability is an instance of a use after free vulnerability in the Primetime SDK. The mismatch between an old and a new object can provide an attacker with unintended memory access -- potentially leading to code corruption, control-flow hijack, or an information leak attack. Successful exploitation could lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11215", "url": "https://www.suse.com/security/cve/CVE-2017-11215" }, { "category": "external", "summary": "SUSE Bug 1084296 for CVE-2017-11215", "url": "https://bugzilla.suse.com/1084296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-11215" }, { "cve": "CVE-2017-11225", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11225" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability is an instance of a use after free vulnerability in the Primetime SDK metadata functionality. The mismatch between an old and a new object can provide an attacker with unintended memory access -- potentially leading to code corruption, control-flow hijack, or an information leak attack. Successful exploitation could lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11225", "url": "https://www.suse.com/security/cve/CVE-2017-11225" }, { "category": "external", "summary": "SUSE Bug 1084296 for CVE-2017-11225", "url": "https://bugzilla.suse.com/1084296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-11225" }, { "cve": "CVE-2017-15386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15386" } ], "notes": [ { "category": "general", "text": "Incorrect implementation in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15386", "url": "https://www.suse.com/security/cve/CVE-2017-15386" }, { "category": "external", "summary": "SUSE Bug 1064066 for CVE-2017-15386", "url": "https://bugzilla.suse.com/1064066" }, { "category": "external", "summary": "SUSE Bug 1064089 for CVE-2017-15386", "url": "https://bugzilla.suse.com/1064089" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-15386" }, { "cve": "CVE-2017-15387", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15387" } ], "notes": [ { "category": "general", "text": "Insufficient enforcement of Content Security Policy in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to open javascript: URL windows when they should not be allowed to via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15387", "url": "https://www.suse.com/security/cve/CVE-2017-15387" }, { "category": "external", "summary": "SUSE Bug 1064066 for CVE-2017-15387", "url": "https://bugzilla.suse.com/1064066" }, { "category": "external", "summary": "SUSE Bug 1064089 for CVE-2017-15387", "url": "https://bugzilla.suse.com/1064089" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-15387" }, { "cve": "CVE-2017-15388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15388" } ], "notes": [ { "category": "general", "text": "Iteration through non-finite points in Skia in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15388", "url": "https://www.suse.com/security/cve/CVE-2017-15388" }, { "category": "external", "summary": "SUSE Bug 1064066 for CVE-2017-15388", "url": "https://bugzilla.suse.com/1064066" }, { "category": "external", "summary": "SUSE Bug 1064089 for CVE-2017-15388", "url": "https://bugzilla.suse.com/1064089" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-15388" }, { "cve": "CVE-2017-15389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15389" } ], "notes": [ { "category": "general", "text": "An insufficient watchdog timer in navigation in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15389", "url": "https://www.suse.com/security/cve/CVE-2017-15389" }, { "category": "external", "summary": "SUSE Bug 1064066 for CVE-2017-15389", "url": "https://bugzilla.suse.com/1064066" }, { "category": "external", "summary": "SUSE Bug 1064089 for CVE-2017-15389", "url": "https://bugzilla.suse.com/1064089" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-15389" }, { "cve": "CVE-2017-15390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15390" } ], "notes": [ { "category": "general", "text": "Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15390", "url": "https://www.suse.com/security/cve/CVE-2017-15390" }, { "category": "external", "summary": "SUSE Bug 1064066 for CVE-2017-15390", "url": "https://bugzilla.suse.com/1064066" }, { "category": "external", "summary": "SUSE Bug 1064089 for CVE-2017-15390", "url": "https://bugzilla.suse.com/1064089" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-15390" }, { "cve": "CVE-2017-15391", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15391" } ], "notes": [ { "category": "general", "text": "Insufficient Policy Enforcement in Extensions in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to access Extension pages without authorisation via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15391", "url": "https://www.suse.com/security/cve/CVE-2017-15391" }, { "category": "external", "summary": "SUSE Bug 1064066 for CVE-2017-15391", "url": "https://bugzilla.suse.com/1064066" }, { "category": "external", "summary": "SUSE Bug 1064089 for CVE-2017-15391", "url": "https://bugzilla.suse.com/1064089" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-15391" }, { "cve": "CVE-2017-15392", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15392" } ], "notes": [ { "category": "general", "text": "Insufficient data validation in V8 in Google Chrome prior to 62.0.3202.62 allowed an attacker who can write to the Windows Registry to potentially exploit heap corruption via a crafted Windows Registry entry, related to PlatformIntegration.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15392", "url": "https://www.suse.com/security/cve/CVE-2017-15392" }, { "category": "external", "summary": "SUSE Bug 1064066 for CVE-2017-15392", "url": "https://bugzilla.suse.com/1064066" }, { "category": "external", "summary": "SUSE Bug 1064089 for CVE-2017-15392", "url": "https://bugzilla.suse.com/1064089" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-15392" }, { "cve": "CVE-2017-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15393" } ], "notes": [ { "category": "general", "text": "Insufficient Policy Enforcement in Devtools remote debugging in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to obtain access to remote debugging functionality via a crafted HTML page, aka a Referer leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15393", "url": "https://www.suse.com/security/cve/CVE-2017-15393" }, { "category": "external", "summary": "SUSE Bug 1064066 for CVE-2017-15393", "url": "https://bugzilla.suse.com/1064066" }, { "category": "external", "summary": "SUSE Bug 1064089 for CVE-2017-15393", "url": "https://bugzilla.suse.com/1064089" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-15393" }, { "cve": "CVE-2017-15394", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15394" } ], "notes": [ { "category": "general", "text": "Insufficient Policy Enforcement in Extensions in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform domain spoofing in permission dialogs via IDN homographs in a crafted Chrome Extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15394", "url": "https://www.suse.com/security/cve/CVE-2017-15394" }, { "category": "external", "summary": "SUSE Bug 1064066 for CVE-2017-15394", "url": "https://bugzilla.suse.com/1064066" }, { "category": "external", "summary": "SUSE Bug 1064089 for CVE-2017-15394", "url": "https://bugzilla.suse.com/1064089" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-15394" }, { "cve": "CVE-2017-15395", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15395" } ], "notes": [ { "category": "general", "text": "A use after free in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka an ImageCapture NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15395", "url": "https://www.suse.com/security/cve/CVE-2017-15395" }, { "category": "external", "summary": "SUSE Bug 1064066 for CVE-2017-15395", "url": "https://bugzilla.suse.com/1064066" }, { "category": "external", "summary": "SUSE Bug 1064089 for CVE-2017-15395", "url": "https://bugzilla.suse.com/1064089" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-15395" }, { "cve": "CVE-2017-15396", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15396" } ], "notes": [ { "category": "general", "text": "A stack buffer overflow in NumberingSystem in International Components for Unicode (ICU) for C/C++ before 60.2, as used in V8 in Google Chrome prior to 62.0.3202.75 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15396", "url": "https://www.suse.com/security/cve/CVE-2017-15396" }, { "category": "external", "summary": "SUSE Bug 1065405 for CVE-2017-15396", "url": "https://bugzilla.suse.com/1065405" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-15396" }, { "cve": "CVE-2017-15398", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15398" } ], "notes": [ { "category": "general", "text": "A stack buffer overflow in the QUIC networking stack in Google Chrome prior to 62.0.3202.89 allowed a remote attacker to gain code execution via a malicious server.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15398", "url": "https://www.suse.com/security/cve/CVE-2017-15398" }, { "category": "external", "summary": "SUSE Bug 1066851 for CVE-2017-15398", "url": "https://bugzilla.suse.com/1066851" }, { "category": "external", "summary": "SUSE Bug 1066853 for CVE-2017-15398", "url": "https://bugzilla.suse.com/1066853" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.x86_64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.ppc64le", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.s390x", "openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-15398" }, { "cve": "CVE-2017-15399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15399" } ], "notes": [ { "category": "general", "text": "A use after free in V8 in Google Chrome prior to 62.0.3202.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.aarch64", "openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1.ppc64le", "op