Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-13543 (GCVE-0-2020-13543)
Vulnerability from cvelistv5 – Published: 2020-12-03 16:24 – Updated: 2024-08-04 12:18- use after free
| URL | Tags |
|---|---|
| https://talosintelligence.com/vulnerability_repor… | x_refsource_MISC |
| https://security.gentoo.org/glsa/202012-10 | vendor-advisoryx_refsource_GENTOO |
| https://www.oracle.com/security-alerts/cpuapr2022.html | x_refsource_MISC |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T12:18:18.470Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155"
},
{
"name": "GLSA-202012-10",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202012-10"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Webkit",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Webkit WebKitGTK 2.30.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "use after free",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-04-19T23:21:19.000Z",
"orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
"shortName": "talos"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155"
},
{
"name": "GLSA-202012-10",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202012-10"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "talos-cna@cisco.com",
"ID": "CVE-2020-13543",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Webkit",
"version": {
"version_data": [
{
"version_value": "Webkit WebKitGTK 2.30.0"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability."
}
]
},
"impact": {
"cvss": {
"baseScore": 8.8,
"baseSeverity": "High",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "use after free"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155",
"refsource": "MISC",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155"
},
{
"name": "GLSA-202012-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202012-10"
},
{
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
"assignerShortName": "talos",
"cveId": "CVE-2020-13543",
"datePublished": "2020-12-03T16:24:55.000Z",
"dateReserved": "2020-05-26T00:00:00.000Z",
"dateUpdated": "2024-08-04T12:18:18.470Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2020-13543",
"date": "2026-05-19",
"epss": "0.01497",
"percentile": "0.81315"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:webkitgtk:webkitgtk:2.30.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37C822F7-B450-488A-B05C-482196E34F44\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.\"}, {\"lang\": \"es\", \"value\": \"Se presenta una vulnerabilidad de ejecuci\\u00f3n de c\\u00f3digo en la funcionalidad WebSocket de Webkit WebKitGTK versi\\u00f3n 2.30.0.\u0026#xa0;Una p\\u00e1gina web especialmente dise\\u00f1ada puede desencadenar una vulnerabilidad de uso de la memoria previamente liberada que puede conllevar a una ejecuci\\u00f3n de c\\u00f3digo remota.\u0026#xa0;Un atacante puede lograr que un usuario visite una p\\u00e1gina web para desencadenar esta vulnerabilidad\"}]",
"id": "CVE-2020-13543",
"lastModified": "2024-11-21T05:01:27.770",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV30\": [{\"source\": \"talos-cna@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2020-12-03T17:15:12.083",
"references": "[{\"url\": \"https://security.gentoo.org/glsa/202012-10\", \"source\": \"talos-cna@cisco.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155\", \"source\": \"talos-cna@cisco.com\", \"tags\": [\"Exploit\", \"Technical Description\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2022.html\", \"source\": \"talos-cna@cisco.com\", \"tags\": [\"Not Applicable\", \"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202012-10\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Technical Description\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2022.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Not Applicable\", \"Third Party Advisory\"]}]",
"sourceIdentifier": "talos-cna@cisco.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-13543\",\"sourceIdentifier\":\"talos-cna@cisco.com\",\"published\":\"2020-12-03T17:15:12.083\",\"lastModified\":\"2024-11-21T05:01:27.770\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo en la funcionalidad WebSocket de Webkit WebKitGTK versi\u00f3n 2.30.0.\u0026#xa0;Una p\u00e1gina web especialmente dise\u00f1ada puede desencadenar una vulnerabilidad de uso de la memoria previamente liberada que puede conllevar a una ejecuci\u00f3n de c\u00f3digo remota.\u0026#xa0;Un atacante puede lograr que un usuario visite una p\u00e1gina web para desencadenar esta vulnerabilidad\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"talos-cna@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:webkitgtk:webkitgtk:2.30.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37C822F7-B450-488A-B05C-482196E34F44\"}]}]}],\"references\":[{\"url\":\"https://security.gentoo.org/glsa/202012-10\",\"source\":\"talos-cna@cisco.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155\",\"source\":\"talos-cna@cisco.com\",\"tags\":[\"Exploit\",\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"talos-cna@cisco.com\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202012-10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]}]}}"
}
}
CERTFR-2021-AVI-791
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.1.x antérieures à 11.1.7 FP3 | ||
| IBM | N/A | CP4S versions 1.7.0 à 1.7.2 antérieures à 1.8.0.0 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.2.x antérieures à 11.2.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 FP3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "CP4S versions 1.7.0 \u00e0 1.7.2 ant\u00e9rieures \u00e0 1.8.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-8315",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8315"
},
{
"name": "CVE-2021-25215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
},
{
"name": "CVE-2020-24977",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
},
{
"name": "CVE-2020-13543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13543"
},
{
"name": "CVE-2021-23364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23364"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2021-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-3537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2017-12620",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12620"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2020-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8622"
},
{
"name": "CVE-2020-29362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29362"
},
{
"name": "CVE-2020-9983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9983"
},
{
"name": "CVE-2021-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1820"
},
{
"name": "CVE-2018-25011",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25011"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9951"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-20305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20305"
},
{
"name": "CVE-2021-22918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
},
{
"name": "CVE-2021-20578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20578"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2019-13012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13012"
},
{
"name": "CVE-2021-29679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29679"
},
{
"name": "CVE-2020-25648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2020-8624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8624"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2020-14362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14362"
},
{
"name": "CVE-2021-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3516"
},
{
"name": "CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-1826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1826"
},
{
"name": "CVE-2020-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8617"
},
{
"name": "CVE-2017-14502",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14502"
},
{
"name": "CVE-2020-29361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29361"
},
{
"name": "CVE-2021-1817",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1817"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2020-14347",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14347"
},
{
"name": "CVE-2020-14360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14360"
},
{
"name": "CVE-2021-1825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1825"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2020-14346",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14346"
},
{
"name": "CVE-2020-14361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14361"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2021-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30661"
},
{
"name": "CVE-2020-8927",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8927"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2020-29363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29363"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2020-13584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13584"
},
{
"name": "CVE-2020-36328",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36328"
},
{
"name": "CVE-2020-27619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27619"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2019-9169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2020-4951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4951"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2021-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
},
{
"name": "CVE-2020-13933",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13933"
},
{
"name": "CVE-2020-14344",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14344"
},
{
"name": "CVE-2021-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-24332",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24332"
},
{
"name": "CVE-2020-25712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25712"
},
{
"name": "CVE-2021-29745",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29745"
},
{
"name": "CVE-2020-24330",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24330"
},
{
"name": "CVE-2020-36329",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36329"
},
{
"name": "CVE-2021-29894",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29894"
},
{
"name": "CVE-2020-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9948"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-23362",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23362"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-3518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
},
{
"name": "CVE-2020-24331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24331"
},
{
"name": "CVE-2020-14345",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14345"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
},
{
"name": "CVE-2020-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8625"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-791",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6491661 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6491661"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6493729 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6493729"
}
]
}
CERTFR-2021-AVI-791
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.1.x antérieures à 11.1.7 FP3 | ||
| IBM | N/A | CP4S versions 1.7.0 à 1.7.2 antérieures à 1.8.0.0 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.2.x antérieures à 11.2.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 FP3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "CP4S versions 1.7.0 \u00e0 1.7.2 ant\u00e9rieures \u00e0 1.8.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-8315",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8315"
},
{
"name": "CVE-2021-25215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
},
{
"name": "CVE-2020-24977",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
},
{
"name": "CVE-2020-13543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13543"
},
{
"name": "CVE-2021-23364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23364"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2021-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-3537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2017-12620",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12620"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2020-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8622"
},
{
"name": "CVE-2020-29362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29362"
},
{
"name": "CVE-2020-9983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9983"
},
{
"name": "CVE-2021-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1820"
},
{
"name": "CVE-2018-25011",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25011"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9951"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-20305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20305"
},
{
"name": "CVE-2021-22918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
},
{
"name": "CVE-2021-20578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20578"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2019-13012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13012"
},
{
"name": "CVE-2021-29679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29679"
},
{
"name": "CVE-2020-25648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2020-8624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8624"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2020-14362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14362"
},
{
"name": "CVE-2021-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3516"
},
{
"name": "CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-1826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1826"
},
{
"name": "CVE-2020-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8617"
},
{
"name": "CVE-2017-14502",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14502"
},
{
"name": "CVE-2020-29361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29361"
},
{
"name": "CVE-2021-1817",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1817"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2020-14347",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14347"
},
{
"name": "CVE-2020-14360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14360"
},
{
"name": "CVE-2021-1825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1825"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2020-14346",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14346"
},
{
"name": "CVE-2020-14361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14361"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2021-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30661"
},
{
"name": "CVE-2020-8927",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8927"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2020-29363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29363"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2020-13584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13584"
},
{
"name": "CVE-2020-36328",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36328"
},
{
"name": "CVE-2020-27619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27619"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2019-9169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2020-4951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4951"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2021-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
},
{
"name": "CVE-2020-13933",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13933"
},
{
"name": "CVE-2020-14344",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14344"
},
{
"name": "CVE-2021-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-24332",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24332"
},
{
"name": "CVE-2020-25712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25712"
},
{
"name": "CVE-2021-29745",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29745"
},
{
"name": "CVE-2020-24330",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24330"
},
{
"name": "CVE-2020-36329",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36329"
},
{
"name": "CVE-2021-29894",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29894"
},
{
"name": "CVE-2020-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9948"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-23362",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23362"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-3518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
},
{
"name": "CVE-2020-24331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24331"
},
{
"name": "CVE-2020-14345",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14345"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
},
{
"name": "CVE-2020-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8625"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-791",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6491661 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6491661"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6493729 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6493729"
}
]
}
alsa-2021:1586
Vulnerability from osv_almalinux
GNOME is the default desktop environment of AlmaLinux.
The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304)
Security Fix(es):
-
webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)
-
webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)
-
webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)
-
webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)
-
webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)
-
glib2: insecure permissions for files and directories (CVE-2019-13012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "OpenEXR-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.2.0-12.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "OpenEXR-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.2.0-12.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "accountsservice-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.6.55-1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "atkmm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.24.2-7.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "atkmm-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.24.2-7.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "atkmm-doc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.24.2-7.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "cairomm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.12.0-8.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "cairomm-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.12.0-8.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "cairomm-doc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.12.0-8.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "chrome-gnome-shell"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "10.1-7.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "dleyna-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.6.0-3.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "dleyna-server"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.6.0-3.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "enchant2"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.2.3-3.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "enchant2-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.2.3-3.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gamin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.1.10-32.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gamin-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.1.10-32.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "geoclue2"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.5.5-2.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "geoclue2-demos"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.5.5-2.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "geoclue2-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.5.5-2.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "geoclue2-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.5.5-2.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "geocode-glib"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.26.0-3.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "geocode-glib-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.26.0-3.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gjs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.56.2-5.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gjs-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.56.2-5.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "glib2-doc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.56.4-9.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "glib2-static"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.56.4-9.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "glibmm24"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.56.0-2.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "glibmm24-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.56.0-2.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "glibmm24-doc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.56.0-2.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gnome-boxes"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.36.5-8.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gnome-photos"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.28.1-4.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gnome-photos-tests"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.28.1-4.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gnome-terminal"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.28.3-3.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gnome-terminal-nautilus"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.28.3-3.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gtk-doc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.28-3.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gtk2"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.24.32-5.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gtk2-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.24.32-5.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gtk2-devel-docs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.24.32-5.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gtk2-immodule-xim"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.24.32-5.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gtk2-immodules"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.24.32-5.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gtkmm24"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.24.5-6.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gtkmm24-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.24.5-6.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gtkmm24-docs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.24.5-6.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gtkmm30"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.22.2-3.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gtkmm30-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.22.2-3.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gtkmm30-doc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.22.2-3.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gvfs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.36.2-11.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gvfs-afc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.36.2-11.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gvfs-afp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.36.2-11.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gvfs-archive"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.36.2-11.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gvfs-client"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.36.2-11.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gvfs-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.36.2-11.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gvfs-fuse"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.36.2-11.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gvfs-goa"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.36.2-11.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gvfs-gphoto2"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.36.2-11.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gvfs-mtp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.36.2-11.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "gvfs-smb"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.36.2-11.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libdazzle"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.28.5-2.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libdazzle-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.28.5-2.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libepubgen"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.1.0-3.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libepubgen-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.1.0-3.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libsass"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.4.5-6.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libsass-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.4.5-6.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libsigc++20"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.10.0-6.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libsigc++20-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.10.0-6.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libsigc++20-doc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.10.0-6.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvisual"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:0.4.0-25.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvisual-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:0.4.0-25.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mutter-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.32.2-57.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nautilus"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.28.1-15.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nautilus-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.28.1-15.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nautilus-extensions"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.28.1-15.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "pangomm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.40.1-6.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "pangomm-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.40.1-6.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "pangomm-doc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.40.1-6.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "soundtouch"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.0.0-3.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "soundtouch-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.0.0-3.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "vala"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.40.19-2.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "vala-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.40.19-2.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "woff2"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.0.2-5.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "woff2-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.0.2-5.el8"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "GNOME is the default desktop environment of AlmaLinux.\n\nThe following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304)\n\nSecurity Fix(es):\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)\n\n* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)\n\n* glib2: insecure permissions for files and directories (CVE-2019-13012)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.",
"id": "ALSA-2021:1586",
"modified": "2021-11-12T10:20:56Z",
"published": "2021-05-18T05:35:26Z",
"references": [
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2021-1586.html"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2019-13012"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-13543"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-13584"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-16125"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-9948"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-9951"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-9983"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-1817"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-1820"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-1825"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-1826"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30661"
}
],
"related": [
"CVE-2020-9948",
"CVE-2020-9951",
"CVE-2020-9983",
"CVE-2020-13543",
"CVE-2020-13584",
"CVE-2019-13012"
],
"summary": "Moderate: GNOME security, bug fix, and enhancement update"
}
BDU:2022-07049
Vulnerability from fstec - Published: 30.11.2020{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Novell Inc., Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "12 SP3 (SUSE Linux Enterprise Server for SAP Applications), 12 SP4 (SUSE Linux Enterprise Server for SAP Applications), 8 (Red Hat Enterprise Linux), 12 SP2-BCL (Suse Linux Enterprise Server), 15.1 (OpenSUSE Leap), 15 (SUSE Linux Enterprise Server for SAP Applications), 15 SP1 (SUSE Linux Enterprise Server for SAP Applications), 12 SP2-LTSS (Suse Linux Enterprise Server), 12 SP3-LTSS (Suse Linux Enterprise Server), 12 SP3-BCL (Suse Linux Enterprise Server), 12 SP5 (Suse Linux Enterprise Server), 12 SP5 (SUSE Linux Enterprise Server for SAP Applications), 10 (Debian GNU/Linux), 12 SP3-ESPOS (Suse Linux Enterprise Server), 15-LTSS (Suse Linux Enterprise Server), 15.2 (OpenSUSE Leap), 12 SP4-ESPOS (Suse Linux Enterprise Server), 12 SP4-LTSS (Suse Linux Enterprise Server), 15.3 (OpenSUSE Leap), 15 SP1 (Suse Linux Enterprise Server), 11 (Debian GNU/Linux), 15.4 (OpenSUSE Leap), 15 SP3 (Suse Linux Enterprise Server), 15 SP3 (SUSE Linux Enterprise Server for SAP Applications), 15 SP3 (Suse Linux Enterprise Desktop), 15 SP2 (Suse Linux Enterprise Server), 15 SP2 (SUSE Linux Enterprise Server for SAP Applications), 15 SP4 (Suse Linux Enterprise Server), 15 SP2 (Suse Linux Enterprise Desktop), 15 SP4 (Suse Linux Enterprise Desktop), 15 SP4 (SUSE Linux Enterprise Server for SAP Applications), 15 SP1 (Suse Linux Enterprise Desktop), \u0434\u043e 2.30.3 (WebKitGTK), \u0434\u043e 2.30.3 (WPE WebKit)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\n\u0414\u043b\u044f WebKitGTK \u0438 WPE WebKit:\nhttps://wpewebkit.org/security/WSA-2020-0009.html\nhttps://webkitgtk.org/security/WSA-2020-0009.html\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1155\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2020-13543\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2020-13543\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2020-13543.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "30.11.2020",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "30.11.2022",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "30.11.2022",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-07049",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2020-13543",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "SUSE Linux Enterprise Server for SAP Applications, Red Hat Enterprise Linux, Suse Linux Enterprise Server, OpenSUSE Leap, Debian GNU/Linux, Suse Linux Enterprise Desktop, WebKitGTK, WPE WebKit",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP3 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP4 , Red Hat Inc. Red Hat Enterprise Linux 8 , Novell Inc. Suse Linux Enterprise Server 12 SP2-BCL , Novell Inc. OpenSUSE Leap 15.1 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP1 , Novell Inc. Suse Linux Enterprise Server 12 SP2-LTSS , Novell Inc. Suse Linux Enterprise Server 12 SP3-LTSS , Novell Inc. Suse Linux Enterprise Server 12 SP3-BCL , Novell Inc. Suse Linux Enterprise Server 12 SP5 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP5 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , Novell Inc. Suse Linux Enterprise Server 12 SP3-ESPOS , Novell Inc. Suse Linux Enterprise Server 15-LTSS , Novell Inc. OpenSUSE Leap 15.2 , Novell Inc. Suse Linux Enterprise Server 12 SP4-ESPOS , Novell Inc. Suse Linux Enterprise Server 12 SP4-LTSS , Novell Inc. OpenSUSE Leap 15.3 , Novell Inc. Suse Linux Enterprise Server 15 SP1 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , Novell Inc. OpenSUSE Leap 15.4 , Novell Inc. Suse Linux Enterprise Server 15 SP3 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP3 , Novell Inc. Suse Linux Enterprise Desktop 15 SP3 , Novell Inc. Suse Linux Enterprise Server 15 SP2 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP2 , Novell Inc. Suse Linux Enterprise Server 15 SP4 , Novell Inc. Suse Linux Enterprise Desktop 15 SP2 , Novell Inc. Suse Linux Enterprise Desktop 15 SP4 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP4 , Novell Inc. Suse Linux Enterprise Desktop 15 SP1 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 WebSocket \u043c\u043e\u0434\u0443\u043b\u0435\u0439 \u043e\u0442\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446 WebKitGTK \u0438 WPE WebKit, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20), \u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f (CWE-416)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 WebSocket \u043c\u043e\u0434\u0443\u043b\u0435\u0439 \u043e\u0442\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446 WebKitGTK \u0438 WPE WebKit \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u0435\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043f\u0443\u0442\u0435\u043c \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0439 \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445, \u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.cybersecurity-help.cz/vdb/SB2021092220\nhttps://security.gentoo.org/glsa/202012-10\nhttps://wpewebkit.org/security/WSA-2020-0009.html\nhttps://webkitgtk.org/security/WSA-2020-0009.html\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1155\nhttps://security-tracker.debian.org/tracker/CVE-2020-13543\nhttps://access.redhat.com/security/cve/cve-2020-13543\nhttps://www.suse.com/security/cve/CVE-2020-13543.html",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20, CWE-416",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
CNVD-2022-06525
Vulnerability from cnvd - Published: 2022-01-25厂商已发布了漏洞修复程序,请及时关注更新: https://webkit.org/
| Name | Webkitgtk webkitgtk 2.30.0 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-13543",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543"
}
},
"description": "WebKitGTK\u662f\u4e00\u4e2aWebKit\u6e32\u67d3\u5f15\u64ce\u7684\u5168\u529f\u80fd\u7aef\u53e3\u3002\n\nWebKitGTK 2.30.0\u7684WebSocket\u529f\u80fd\u5b58\u5728\u91ca\u653e\u540e\u91cd\u7528\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u8bf1\u4f7f\u7528\u6237\u8bbf\u95ee\u7279\u5236\u7f51\u9875\u5229\u7528\u8be5\u6f0f\u6d1e\u5b9e\u73b0\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://webkit.org/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2022-06525",
"openTime": "2022-01-25",
"patchDescription": "WebKitGTK\u662f\u4e00\u4e2aWebKit\u6e32\u67d3\u5f15\u64ce\u7684\u5168\u529f\u80fd\u7aef\u53e3\u3002\r\n\r\nWebKitGTK 2.30.0\u7684WebSocket\u529f\u80fd\u5b58\u5728\u91ca\u653e\u540e\u91cd\u7528\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u8bf1\u4f7f\u7528\u6237\u8bbf\u95ee\u7279\u5236\u7f51\u9875\u5229\u7528\u8be5\u6f0f\u6d1e\u5b9e\u73b0\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "WebKitGTK\u91ca\u653e\u540e\u91cd\u7528\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Webkitgtk webkitgtk 2.30.0"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543",
"serverity": "\u4e2d",
"submitTime": "2020-12-04",
"title": "WebKitGTK\u91ca\u653e\u540e\u91cd\u7528\u6f0f\u6d1e"
}
FKIE_CVE-2020-13543
Vulnerability from fkie_nvd - Published: 2020-12-03 17:15 - Updated: 2024-11-21 05:01| URL | Tags | ||
|---|---|---|---|
| talos-cna@cisco.com | https://security.gentoo.org/glsa/202012-10 | Third Party Advisory | |
| talos-cna@cisco.com | https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155 | Exploit, Technical Description, Third Party Advisory | |
| talos-cna@cisco.com | https://www.oracle.com/security-alerts/cpuapr2022.html | Not Applicable, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202012-10 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155 | Exploit, Technical Description, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2022.html | Not Applicable, Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webkitgtk:webkitgtk:2.30.0:*:*:*:*:*:*:*",
"matchCriteriaId": "37C822F7-B450-488A-B05C-482196E34F44",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability."
},
{
"lang": "es",
"value": "Se presenta una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo en la funcionalidad WebSocket de Webkit WebKitGTK versi\u00f3n 2.30.0.\u0026#xa0;Una p\u00e1gina web especialmente dise\u00f1ada puede desencadenar una vulnerabilidad de uso de la memoria previamente liberada que puede conllevar a una ejecuci\u00f3n de c\u00f3digo remota.\u0026#xa0;Un atacante puede lograr que un usuario visite una p\u00e1gina web para desencadenar esta vulnerabilidad"
}
],
"id": "CVE-2020-13543",
"lastModified": "2024-11-21T05:01:27.770",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "talos-cna@cisco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-12-03T17:15:12.083",
"references": [
{
"source": "talos-cna@cisco.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202012-10"
},
{
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155"
},
{
"source": "talos-cna@cisco.com",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202012-10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
],
"sourceIdentifier": "talos-cna@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-MQWF-VG2C-5CH3
Vulnerability from github – Published: 2022-05-24 17:35 – Updated: 2022-05-24 17:35A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
{
"affected": [],
"aliases": [
"CVE-2020-13543"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-12-03T17:15:00Z",
"severity": "HIGH"
},
"details": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.",
"id": "GHSA-mqwf-vg2c-5ch3",
"modified": "2022-05-24T17:35:07Z",
"published": "2022-05-24T17:35:07Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202012-10"
},
{
"type": "WEB",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2020-13543
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2020-13543",
"description": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.",
"id": "GSD-2020-13543",
"references": [
"https://www.suse.com/security/cve/CVE-2020-13543.html",
"https://access.redhat.com/errata/RHSA-2021:1586",
"https://advisories.mageia.org/CVE-2020-13543.html",
"https://security.archlinux.org/CVE-2020-13543",
"https://linux.oracle.com/cve/CVE-2020-13543.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-13543"
],
"details": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.",
"id": "GSD-2020-13543",
"modified": "2023-12-13T01:21:47.220294Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "talos-cna@cisco.com",
"ID": "CVE-2020-13543",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Webkit",
"version": {
"version_data": [
{
"version_value": "Webkit WebKitGTK 2.30.0"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability."
}
]
},
"impact": {
"cvss": {
"baseScore": 8.8,
"baseSeverity": "High",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "use after free"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155",
"refsource": "MISC",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155"
},
{
"name": "GLSA-202012-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202012-10"
},
{
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:webkitgtk:webkitgtk:2.30.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "talos-cna@cisco.com",
"ID": "CVE-2020-13543"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155",
"refsource": "MISC",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155"
},
{
"name": "GLSA-202012-10",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202012-10"
},
{
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html",
"refsource": "MISC",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2022-05-10T15:46Z",
"publishedDate": "2020-12-03T17:15Z"
}
}
}
OPENSUSE-SU-2020:2304-1
Vulnerability from csaf_opensuse - Published: 2020-12-21 04:21 - Updated: 2020-12-21 04:21| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://bugzilla.suse.com/1171531 | self |
| https://bugzilla.suse.com/1177087 | self |
| https://bugzilla.suse.com/1179122 | self |
| https://bugzilla.suse.com/1179451 | self |
| https://www.suse.com/security/cve/CVE-2020-13543/ | self |
| https://www.suse.com/security/cve/CVE-2020-13584/ | self |
| https://www.suse.com/security/cve/CVE-2020-9948/ | self |
| https://www.suse.com/security/cve/CVE-2020-9951/ | self |
| https://www.suse.com/security/cve/CVE-2020-9983/ | self |
| https://www.suse.com/security/cve/CVE-2020-13543 | external |
| https://bugzilla.suse.com/1179451 | external |
| https://www.suse.com/security/cve/CVE-2020-13584 | external |
| https://bugzilla.suse.com/1179122 | external |
| https://bugzilla.suse.com/1179910 | external |
| https://bugzilla.suse.com/1179911 | external |
| https://bugzilla.suse.com/1179912 | external |
| https://www.suse.com/security/cve/CVE-2020-9948 | external |
| https://bugzilla.suse.com/1179122 | external |
| https://bugzilla.suse.com/1179910 | external |
| https://bugzilla.suse.com/1179911 | external |
| https://bugzilla.suse.com/1179912 | external |
| https://www.suse.com/security/cve/CVE-2020-9951 | external |
| https://bugzilla.suse.com/1179122 | external |
| https://bugzilla.suse.com/1179910 | external |
| https://bugzilla.suse.com/1179911 | external |
| https://bugzilla.suse.com/1179912 | external |
| https://www.suse.com/security/cve/CVE-2020-9983 | external |
| https://bugzilla.suse.com/1179122 | external |
| https://bugzilla.suse.com/1179910 | external |
| https://bugzilla.suse.com/1179911 | external |
| https://bugzilla.suse.com/1179912 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for webkit2gtk3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for webkit2gtk3 fixes the following issues:\n\n-webkit2gtk3 was updated to version 2.30.3 (bsc#1179122 bsc#1179451):\n - CVE-2021-13543: Fixed a use after free which could have led to arbitrary code execution.\n - CVE-2021-13584: Fixed a use after free which could have led to arbitrary code execution.\n - CVE-2021-9948: Fixed a type confusion which could have led to arbitrary code execution.\n - CVE-2021-9951: Fixed a use after free which could have led to arbitrary code execution.\n - CVE-2021-9983: Fixed an out of bounds write which could have led to arbitrary code execution.\n - Have the libwebkit2gtk package require libjavascriptcoregtk of\n the same version (bsc#1171531).\n - Enable c_loop on aarch64: currently needed for compilation to\n succeed with JIT disabled. Also disable sampling profiler, since\n it conflicts with c_loop (bsc#1177087).\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-2304",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_2304-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:2304-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IUIQR7TXEJAY36F5QQB7QCCGHWKYG7E/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:2304-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IUIQR7TXEJAY36F5QQB7QCCGHWKYG7E/"
},
{
"category": "self",
"summary": "SUSE Bug 1171531",
"url": "https://bugzilla.suse.com/1171531"
},
{
"category": "self",
"summary": "SUSE Bug 1177087",
"url": "https://bugzilla.suse.com/1177087"
},
{
"category": "self",
"summary": "SUSE Bug 1179122",
"url": "https://bugzilla.suse.com/1179122"
},
{
"category": "self",
"summary": "SUSE Bug 1179451",
"url": "https://bugzilla.suse.com/1179451"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13543 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13584 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13584/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-9948 page",
"url": "https://www.suse.com/security/cve/CVE-2020-9948/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-9951 page",
"url": "https://www.suse.com/security/cve/CVE-2020-9951/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-9983 page",
"url": "https://www.suse.com/security/cve/CVE-2020-9983/"
}
],
"title": "Security update for webkit2gtk3",
"tracking": {
"current_release_date": "2020-12-21T04:21:59Z",
"generator": {
"date": "2020-12-21T04:21:59Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:2304-1",
"initial_release_date": "2020-12-21T04:21:59Z",
"revision_history": [
{
"date": "2020-12-21T04:21:59Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586",
"product": {
"name": "libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586",
"product_id": "libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586",
"product": {
"name": "libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586",
"product_id": "libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586"
}
},
{
"category": "product_version",
"name": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586",
"product": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586",
"product_id": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586",
"product": {
"name": "typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586",
"product_id": "typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586",
"product": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586",
"product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586"
}
},
{
"category": "product_version",
"name": "webkit-jsc-4-2.30.3-lp151.2.28.2.i586",
"product": {
"name": "webkit-jsc-4-2.30.3-lp151.2.28.2.i586",
"product_id": "webkit-jsc-4-2.30.3-lp151.2.28.2.i586"
}
},
{
"category": "product_version",
"name": "webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586",
"product": {
"name": "webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586",
"product_id": "webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586",
"product": {
"name": "webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586",
"product_id": "webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586",
"product": {
"name": "webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586",
"product_id": "webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch",
"product": {
"name": "libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch",
"product_id": "libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64",
"product": {
"name": "libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64",
"product_id": "libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64"
}
},
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64",
"product": {
"name": "libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64",
"product_id": "libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64",
"product": {
"name": "libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64",
"product_id": "libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64",
"product": {
"name": "libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64",
"product_id": "libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64",
"product": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64",
"product_id": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64",
"product": {
"name": "typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64",
"product_id": "typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64",
"product": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64",
"product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64"
}
},
{
"category": "product_version",
"name": "webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64",
"product": {
"name": "webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64",
"product_id": "webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64"
}
},
{
"category": "product_version",
"name": "webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64",
"product": {
"name": "webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64",
"product_id": "webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64",
"product": {
"name": "webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64",
"product_id": "webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64",
"product": {
"name": "webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64",
"product_id": "webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586"
},
"product_reference": "libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64"
},
"product_reference": "libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64"
},
"product_reference": "libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch"
},
"product_reference": "libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586"
},
"product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64"
},
"product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit-jsc-4-2.30.3-lp151.2.28.2.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586"
},
"product_reference": "webkit-jsc-4-2.30.3-lp151.2.28.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64"
},
"product_reference": "webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586"
},
"product_reference": "webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64"
},
"product_reference": "webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586"
},
"product_reference": "webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64"
},
"product_reference": "webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-13543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13543"
}
],
"notes": [
{
"category": "general",
"text": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13543",
"url": "https://www.suse.com/security/cve/CVE-2020-13543"
},
{
"category": "external",
"summary": "SUSE Bug 1179451 for CVE-2020-13543",
"url": "https://bugzilla.suse.com/1179451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-12-21T04:21:59Z",
"details": "important"
}
],
"title": "CVE-2020-13543"
},
{
"cve": "CVE-2020-13584",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13584"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13584",
"url": "https://www.suse.com/security/cve/CVE-2020-13584"
},
{
"category": "external",
"summary": "SUSE Bug 1179122 for CVE-2020-13584",
"url": "https://bugzilla.suse.com/1179122"
},
{
"category": "external",
"summary": "SUSE Bug 1179910 for CVE-2020-13584",
"url": "https://bugzilla.suse.com/1179910"
},
{
"category": "external",
"summary": "SUSE Bug 1179911 for CVE-2020-13584",
"url": "https://bugzilla.suse.com/1179911"
},
{
"category": "external",
"summary": "SUSE Bug 1179912 for CVE-2020-13584",
"url": "https://bugzilla.suse.com/1179912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-12-21T04:21:59Z",
"details": "important"
}
],
"title": "CVE-2020-13584"
},
{
"cve": "CVE-2020-9948",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-9948"
}
],
"notes": [
{
"category": "general",
"text": "A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-9948",
"url": "https://www.suse.com/security/cve/CVE-2020-9948"
},
{
"category": "external",
"summary": "SUSE Bug 1179122 for CVE-2020-9948",
"url": "https://bugzilla.suse.com/1179122"
},
{
"category": "external",
"summary": "SUSE Bug 1179910 for CVE-2020-9948",
"url": "https://bugzilla.suse.com/1179910"
},
{
"category": "external",
"summary": "SUSE Bug 1179911 for CVE-2020-9948",
"url": "https://bugzilla.suse.com/1179911"
},
{
"category": "external",
"summary": "SUSE Bug 1179912 for CVE-2020-9948",
"url": "https://bugzilla.suse.com/1179912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-12-21T04:21:59Z",
"details": "important"
}
],
"title": "CVE-2020-9948"
},
{
"cve": "CVE-2020-9951",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-9951"
}
],
"notes": [
{
"category": "general",
"text": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-9951",
"url": "https://www.suse.com/security/cve/CVE-2020-9951"
},
{
"category": "external",
"summary": "SUSE Bug 1179122 for CVE-2020-9951",
"url": "https://bugzilla.suse.com/1179122"
},
{
"category": "external",
"summary": "SUSE Bug 1179910 for CVE-2020-9951",
"url": "https://bugzilla.suse.com/1179910"
},
{
"category": "external",
"summary": "SUSE Bug 1179911 for CVE-2020-9951",
"url": "https://bugzilla.suse.com/1179911"
},
{
"category": "external",
"summary": "SUSE Bug 1179912 for CVE-2020-9951",
"url": "https://bugzilla.suse.com/1179912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-12-21T04:21:59Z",
"details": "important"
}
],
"title": "CVE-2020-9951"
},
{
"cve": "CVE-2020-9983",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-9983"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-9983",
"url": "https://www.suse.com/security/cve/CVE-2020-9983"
},
{
"category": "external",
"summary": "SUSE Bug 1179122 for CVE-2020-9983",
"url": "https://bugzilla.suse.com/1179122"
},
{
"category": "external",
"summary": "SUSE Bug 1179910 for CVE-2020-9983",
"url": "https://bugzilla.suse.com/1179910"
},
{
"category": "external",
"summary": "SUSE Bug 1179911 for CVE-2020-9983",
"url": "https://bugzilla.suse.com/1179911"
},
{
"category": "external",
"summary": "SUSE Bug 1179912 for CVE-2020-9983",
"url": "https://bugzilla.suse.com/1179912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:libwebkit2gtk3-lang-2.30.3-lp151.2.28.2.noarch",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit-jsc-4-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-devel-2.30.3-lp151.2.28.2.x86_64",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.i586",
"openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.30.3-lp151.2.28.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-12-21T04:21:59Z",
"details": "important"
}
],
"title": "CVE-2020-9983"
}
]
}
OPENSUSE-SU-2020:2310-1
Vulnerability from csaf_opensuse - Published: 2020-12-21 05:33 - Updated: 2020-12-21 05:33| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://bugzilla.suse.com/1171531 | self |
| https://bugzilla.suse.com/1177087 | self |
| https://bugzilla.suse.com/1179122 | self |
| https://bugzilla.suse.com/1179451 | self |
| https://www.suse.com/security/cve/CVE-2020-13543/ | self |
| https://www.suse.com/security/cve/CVE-2020-13584/ | self |
| https://www.suse.com/security/cve/CVE-2020-9948/ | self |
| https://www.suse.com/security/cve/CVE-2020-9951/ | self |
| https://www.suse.com/security/cve/CVE-2020-9983/ | self |
| https://www.suse.com/security/cve/CVE-2020-13543 | external |
| https://bugzilla.suse.com/1179451 | external |
| https://www.suse.com/security/cve/CVE-2020-13584 | external |
| https://bugzilla.suse.com/1179122 | external |
| https://bugzilla.suse.com/1179910 | external |
| https://bugzilla.suse.com/1179911 | external |
| https://bugzilla.suse.com/1179912 | external |
| https://www.suse.com/security/cve/CVE-2020-9948 | external |
| https://bugzilla.suse.com/1179122 | external |
| https://bugzilla.suse.com/1179910 | external |
| https://bugzilla.suse.com/1179911 | external |
| https://bugzilla.suse.com/1179912 | external |
| https://www.suse.com/security/cve/CVE-2020-9951 | external |
| https://bugzilla.suse.com/1179122 | external |
| https://bugzilla.suse.com/1179910 | external |
| https://bugzilla.suse.com/1179911 | external |
| https://bugzilla.suse.com/1179912 | external |
| https://www.suse.com/security/cve/CVE-2020-9983 | external |
| https://bugzilla.suse.com/1179122 | external |
| https://bugzilla.suse.com/1179910 | external |
| https://bugzilla.suse.com/1179911 | external |
| https://bugzilla.suse.com/1179912 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for webkit2gtk3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for webkit2gtk3 fixes the following issues:\n\n-webkit2gtk3 was updated to version 2.30.3 (bsc#1179122 bsc#1179451):\n - CVE-2021-13543: Fixed a use after free which could have led to arbitrary code execution.\n - CVE-2021-13584: Fixed a use after free which could have led to arbitrary code execution.\n - CVE-2021-9948: Fixed a type confusion which could have led to arbitrary code execution.\n - CVE-2021-9951: Fixed a use after free which could have led to arbitrary code execution.\n - CVE-2021-9983: Fixed an out of bounds write which could have led to arbitrary code execution.\n - Have the libwebkit2gtk package require libjavascriptcoregtk of\n the same version (bsc#1171531).\n - Enable c_loop on aarch64: currently needed for compilation to\n succeed with JIT disabled. Also disable sampling profiler, since\n it conflicts with c_loop (bsc#1177087).\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-2310",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_2310-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:2310-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFB3TOJ4CYRIFTJV3HUC6V24BQQDJYA4/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:2310-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFB3TOJ4CYRIFTJV3HUC6V24BQQDJYA4/"
},
{
"category": "self",
"summary": "SUSE Bug 1171531",
"url": "https://bugzilla.suse.com/1171531"
},
{
"category": "self",
"summary": "SUSE Bug 1177087",
"url": "https://bugzilla.suse.com/1177087"
},
{
"category": "self",
"summary": "SUSE Bug 1179122",
"url": "https://bugzilla.suse.com/1179122"
},
{
"category": "self",
"summary": "SUSE Bug 1179451",
"url": "https://bugzilla.suse.com/1179451"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13543 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13584 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13584/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-9948 page",
"url": "https://www.suse.com/security/cve/CVE-2020-9948/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-9951 page",
"url": "https://www.suse.com/security/cve/CVE-2020-9951/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-9983 page",
"url": "https://www.suse.com/security/cve/CVE-2020-9983/"
}
],
"title": "Security update for webkit2gtk3",
"tracking": {
"current_release_date": "2020-12-21T05:33:10Z",
"generator": {
"date": "2020-12-21T05:33:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:2310-1",
"initial_release_date": "2020-12-21T05:33:10Z",
"revision_history": [
{
"date": "2020-12-21T05:33:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586",
"product": {
"name": "libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586",
"product_id": "libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586",
"product": {
"name": "libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586",
"product_id": "libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586"
}
},
{
"category": "product_version",
"name": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586",
"product": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586",
"product_id": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586",
"product": {
"name": "typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586",
"product_id": "typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586",
"product": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586",
"product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586"
}
},
{
"category": "product_version",
"name": "webkit-jsc-4-2.30.3-lp152.2.7.3.i586",
"product": {
"name": "webkit-jsc-4-2.30.3-lp152.2.7.3.i586",
"product_id": "webkit-jsc-4-2.30.3-lp152.2.7.3.i586"
}
},
{
"category": "product_version",
"name": "webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586",
"product": {
"name": "webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586",
"product_id": "webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586",
"product": {
"name": "webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586",
"product_id": "webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586",
"product": {
"name": "webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586",
"product_id": "webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch",
"product": {
"name": "libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch",
"product_id": "libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64",
"product": {
"name": "libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64",
"product_id": "libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64"
}
},
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64",
"product": {
"name": "libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64",
"product_id": "libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64",
"product": {
"name": "libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64",
"product_id": "libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64",
"product": {
"name": "libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64",
"product_id": "libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64",
"product": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64",
"product_id": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64",
"product": {
"name": "typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64",
"product_id": "typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64",
"product": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64",
"product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64"
}
},
{
"category": "product_version",
"name": "webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64",
"product": {
"name": "webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64",
"product_id": "webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64"
}
},
{
"category": "product_version",
"name": "webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64",
"product": {
"name": "webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64",
"product_id": "webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64",
"product": {
"name": "webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64",
"product_id": "webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64",
"product": {
"name": "webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64",
"product_id": "webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586"
},
"product_reference": "libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64"
},
"product_reference": "libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64"
},
"product_reference": "libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch"
},
"product_reference": "libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586"
},
"product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64"
},
"product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit-jsc-4-2.30.3-lp152.2.7.3.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586"
},
"product_reference": "webkit-jsc-4-2.30.3-lp152.2.7.3.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64"
},
"product_reference": "webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586"
},
"product_reference": "webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64"
},
"product_reference": "webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586"
},
"product_reference": "webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64"
},
"product_reference": "webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-13543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13543"
}
],
"notes": [
{
"category": "general",
"text": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13543",
"url": "https://www.suse.com/security/cve/CVE-2020-13543"
},
{
"category": "external",
"summary": "SUSE Bug 1179451 for CVE-2020-13543",
"url": "https://bugzilla.suse.com/1179451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-12-21T05:33:10Z",
"details": "important"
}
],
"title": "CVE-2020-13543"
},
{
"cve": "CVE-2020-13584",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13584"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13584",
"url": "https://www.suse.com/security/cve/CVE-2020-13584"
},
{
"category": "external",
"summary": "SUSE Bug 1179122 for CVE-2020-13584",
"url": "https://bugzilla.suse.com/1179122"
},
{
"category": "external",
"summary": "SUSE Bug 1179910 for CVE-2020-13584",
"url": "https://bugzilla.suse.com/1179910"
},
{
"category": "external",
"summary": "SUSE Bug 1179911 for CVE-2020-13584",
"url": "https://bugzilla.suse.com/1179911"
},
{
"category": "external",
"summary": "SUSE Bug 1179912 for CVE-2020-13584",
"url": "https://bugzilla.suse.com/1179912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-12-21T05:33:10Z",
"details": "important"
}
],
"title": "CVE-2020-13584"
},
{
"cve": "CVE-2020-9948",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-9948"
}
],
"notes": [
{
"category": "general",
"text": "A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-9948",
"url": "https://www.suse.com/security/cve/CVE-2020-9948"
},
{
"category": "external",
"summary": "SUSE Bug 1179122 for CVE-2020-9948",
"url": "https://bugzilla.suse.com/1179122"
},
{
"category": "external",
"summary": "SUSE Bug 1179910 for CVE-2020-9948",
"url": "https://bugzilla.suse.com/1179910"
},
{
"category": "external",
"summary": "SUSE Bug 1179911 for CVE-2020-9948",
"url": "https://bugzilla.suse.com/1179911"
},
{
"category": "external",
"summary": "SUSE Bug 1179912 for CVE-2020-9948",
"url": "https://bugzilla.suse.com/1179912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-12-21T05:33:10Z",
"details": "important"
}
],
"title": "CVE-2020-9948"
},
{
"cve": "CVE-2020-9951",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-9951"
}
],
"notes": [
{
"category": "general",
"text": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-9951",
"url": "https://www.suse.com/security/cve/CVE-2020-9951"
},
{
"category": "external",
"summary": "SUSE Bug 1179122 for CVE-2020-9951",
"url": "https://bugzilla.suse.com/1179122"
},
{
"category": "external",
"summary": "SUSE Bug 1179910 for CVE-2020-9951",
"url": "https://bugzilla.suse.com/1179910"
},
{
"category": "external",
"summary": "SUSE Bug 1179911 for CVE-2020-9951",
"url": "https://bugzilla.suse.com/1179911"
},
{
"category": "external",
"summary": "SUSE Bug 1179912 for CVE-2020-9951",
"url": "https://bugzilla.suse.com/1179912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-12-21T05:33:10Z",
"details": "important"
}
],
"title": "CVE-2020-9951"
},
{
"cve": "CVE-2020-9983",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-9983"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-9983",
"url": "https://www.suse.com/security/cve/CVE-2020-9983"
},
{
"category": "external",
"summary": "SUSE Bug 1179122 for CVE-2020-9983",
"url": "https://bugzilla.suse.com/1179122"
},
{
"category": "external",
"summary": "SUSE Bug 1179910 for CVE-2020-9983",
"url": "https://bugzilla.suse.com/1179910"
},
{
"category": "external",
"summary": "SUSE Bug 1179911 for CVE-2020-9983",
"url": "https://bugzilla.suse.com/1179911"
},
{
"category": "external",
"summary": "SUSE Bug 1179912 for CVE-2020-9983",
"url": "https://bugzilla.suse.com/1179912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:libwebkit2gtk3-lang-2.30.3-lp152.2.7.3.noarch",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit-jsc-4-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-devel-2.30.3-lp152.2.7.3.x86_64",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.i586",
"openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.30.3-lp152.2.7.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-12-21T05:33:10Z",
"details": "important"
}
],
"title": "CVE-2020-9983"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.